共 55 条
[1]
Abdmeziem M.R., Tandjaoui D., An end-to-end secure key management protocol for e-health applications, Comput Electr Eng, 44, pp. 184-197, (2015)
[2]
Watro R., Kong D., Cuti S., Gardiner C., Lynn C., Kruus P., TinyPK: Securing sensor networks with public key technology, Proceedings of the 2Nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59-64, (2004)
[3]
Benenson Z., Gedicke N., Raivio O., Realizing robust user authentication in sensor networks, Real-World Wirel Sens Netw, 14, (2005)
[4]
Wong K.H.M., Zheng Y., Cao J., Wang S., A dynamic user authentication scheme for wireless sensor networks, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC’06), IEEE, 1, (2006)
[5]
Tseng H.-R., Jan R.-H., Yang W., An improved dynamic user authentication scheme for wireless sensor networks, IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, pp. 986-990, (2007)
[6]
Hu F., Jiang M., Wagner M., Dong D.-C., Privacy-preserving telecardiology sensor networks: toward a low-cost portable wireless hardware/software codesign, IEEE Trans Inf Technol Biomed, 11, 6, pp. 619-627, (2007)
[7]
Das M.L., Two-factor user authentication in wireless sensor networks, IEEE Trans Wirel Commun, 8, 3, pp. 1086-1090, (2009)
[8]
Huang Y.-M., Hsieh M.-Y., Chao H.-C., Hung S.-H., Park J.H., Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks, IEEE J Select Areas Commun, 27, 4, pp. 400-411, (2009)
[9]
Malasri K., Wang L., Design and implementation of a securewireless mote-based medical sensor network, Sensors, 9, 8, pp. 6273-6297, (2009)
[10]
Sriram J.C., Shin M., Choudhury T., Kotz D., Activity-aware ECG-based patient authentication for remote health monitoring, Proceedings of the 2009 International Conference on Multimodal Interfaces, pp. 297-304, (2009)