共 55 条
- [1] Abdmeziem M.R., Tandjaoui D., An end-to-end secure key management protocol for e-health applications, Comput Electr Eng, 44, pp. 184-197, (2015)
- [2] Watro R., Kong D., Cuti S., Gardiner C., Lynn C., Kruus P., TinyPK: Securing sensor networks with public key technology, Proceedings of the 2Nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59-64, (2004)
- [3] Benenson Z., Gedicke N., Raivio O., Realizing robust user authentication in sensor networks, Real-World Wirel Sens Netw, 14, (2005)
- [4] Wong K.H.M., Zheng Y., Cao J., Wang S., A dynamic user authentication scheme for wireless sensor networks, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), IEEE, 1, (2006)
- [5] Tseng H.-R., Jan R.-H., Yang W., An improved dynamic user authentication scheme for wireless sensor networks, IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, pp. 986-990, (2007)
- [6] Hu F., Jiang M., Wagner M., Dong D.-C., Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign, IEEE Trans Inf Technol Biomed, 11, 6, pp. 619-627, (2007)
- [7] Das M.L., Two-factor user authentication in wireless sensor networks, IEEE Trans Wirel Commun, 8, 3, pp. 1086-1090, (2009)
- [8] Huang Y.-M., Hsieh M.-Y., Chao H.-C., Hung S.-H., Park J.H., Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks, IEEE J Select Areas Commun, 27, 4, pp. 400-411, (2009)
- [9] Malasri K., Wang L., Design and implementation of a securewireless mote-based medical sensor network, Sensors, 9, 8, pp. 6273-6297, (2009)
- [10] Sriram J.C., Shin M., Choudhury T., Kotz D., Activity-aware ECG-based patient authentication for remote health monitoring, Proceedings of the 2009 International Conference on Multimodal Interfaces, pp. 297-304, (2009)