Information Technology Reference
In-Depth Information
Mont, M. C., Bramhall, P., & Harrison, K. (2003).
A flexible role-based secure messaging service:
Exploiting IBE technology for privacy in health
care. In Proceedings of the 14 th International
Workshop on Database and Expert Systems Ap-
plications (pp. 432-437).
Sufi, F., Khalil, I., & Hu, J. (2010). ECG-based
authentication. In Stavroulakas, P., & Stamp, M.
(Eds.), Handbook of information and communica-
tion security (pp. 309-331). doi:10.1007/978-3-
642-04117-4_17
Taccardi, B., Lux, R. L., Ershler, P. R., MacLeod,
R., Dustman, T. J., & Ingebrigtsen, N. (1997).
Anatomical architecture and electrical activity
of the heart. Acta Cardiologica , 52 (2), 91-105.
Narasimha, C., Hasan, C., & Madhur, S. (2008).
Secure and efficient data transmission over body
sensor and wireless networks. EURASIP Journal
on Wireless Communications and Networking ,
2008.
Tan, C. C., Wang, H., Zhong, S., & Li, Q. (2008).
Body sensor network security: An identity-based
cryptography approach. In Proceedings of the 1 st
ACM Conference on Wireless Network Security
(pp. 148-153).
Poon, C., & Zhang, Y. T. (2006). A novel bio-
metrics method to secure wireless body area
sensor networks for telemedicine and m-health.
Communications Magazine, IEEE , 44 (4), 73-81.
doi:10.1109/MCOM.2006.1632652
Venkatasubramanian, K. K., & Gupta, S. K. S.
(2010). Physiological value-based efficient us-
able security solutions for body sensor networks.
[TOSN]. ACM Transactions on Sensor Networks ,
6 (4), 1-36. doi:10.1145/1777406.1777410
Rescorla, E. (2001). SSL and TLS: Designing and
building secure systems . Boston, MA: Addison-
Wesley.
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A
method for obtaining digital signatures and public-
key cryptosystems. Communications of the ACM ,
21 (2), 120-126. doi:10.1145/359340.359342
Wander, A. S., Gura, N., Eberle, H., Gupta, V., &
Shantz, S. C. (2005). Energy analysis of public-
key cryptography for wireless sensor networks.
In Proceedings of the 3 rd IEEE International
Conference on Pervasive Computing and Com-
munications (PERCOM '05).
Shi, J., Lam, K. Y., Gu, M., Li, M., & Chung, S.
L. (2010). Energy-efficient key distribution using
electrocardiograph biometric set for secure com-
munications in wireless body healthcare networks.
Journal of Medical Systems, 1-9. doi:10.1007/
s10916-010-9467-2
Yongjin, W., Foteini, A., Dimitrios, H., & Kon-
stantinos, N. (2007). Analysis of human electro-
cardiogram for biometric recognition. EURASIP
Journal on Advances in Signal Processing , 2008.
Shoup, V. (2001). A proposal for an ISO standard
for public key encryption. Manuscript , 100 ,
101-103.
Zhang, Y. T., & Shen, L. F. (2006). Physiological
signal based entity authentication for body area
sensor networks and mobile healthcare systems .
27 th Annual International Conference of the IEEE
Engineering in Medicine and Biology Society
(EMBS '05) (pp. 2455-2458).
Singh, Y., & Gupta, P. (2009). Biometrics method
for human identification using electrocardiogram.
In Proceedings of the 3 rd International Conference
on Advances in Biometrics, Alghero, Italy.
Stallings, W. (2003). Cryptography and network
security . Upper Saddle River, NJ: Prentice.
Search WWH ::




Custom Search