Information Technology Reference
In-Depth Information
Mont, M. C., Bramhall, P., & Harrison, K. (2003).
A flexible role-based secure messaging service:
Exploiting IBE technology for privacy in health
care. In
Proceedings of the 14
th
International
Workshop on Database and Expert Systems Ap-
plications
(pp. 432-437).
Sufi, F., Khalil, I., & Hu, J. (2010). ECG-based
authentication. In Stavroulakas, P., & Stamp, M.
(Eds.),
Handbook of information and communica-
tion security
(pp. 309-331). doi:10.1007/978-3-
642-04117-4_17
Taccardi, B., Lux, R. L., Ershler, P. R., MacLeod,
R., Dustman, T. J., & Ingebrigtsen, N. (1997).
Anatomical architecture and electrical activity
of the heart.
Acta Cardiologica
,
52
(2), 91-105.
Narasimha, C., Hasan, C., & Madhur, S. (2008).
Secure and efficient data transmission over body
sensor and wireless networks.
EURASIP Journal
on Wireless Communications and Networking
,
2008.
Tan, C. C., Wang, H., Zhong, S., & Li, Q. (2008).
Body sensor network security: An identity-based
cryptography approach. In
Proceedings of the 1
st
ACM Conference on Wireless Network Security
(pp. 148-153).
Poon, C., & Zhang, Y. T. (2006). A novel bio-
metrics method to secure wireless body area
sensor networks for telemedicine and m-health.
Communications Magazine, IEEE
,
44
(4), 73-81.
doi:10.1109/MCOM.2006.1632652
Venkatasubramanian, K. K., & Gupta, S. K. S.
(2010). Physiological value-based efficient us-
able security solutions for body sensor networks.
[TOSN].
ACM Transactions on Sensor Networks
,
6
(4), 1-36. doi:10.1145/1777406.1777410
Rescorla, E. (2001).
SSL and TLS: Designing and
building secure systems
. Boston, MA: Addison-
Wesley.
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A
method for obtaining digital signatures and public-
key cryptosystems.
Communications of the ACM
,
21
(2), 120-126. doi:10.1145/359340.359342
Wander, A. S., Gura, N., Eberle, H., Gupta, V., &
Shantz, S. C. (2005). Energy analysis of public-
key cryptography for wireless sensor networks.
In
Proceedings of the 3
rd
IEEE International
Conference on Pervasive Computing and Com-
munications
(PERCOM '05).
Shi, J., Lam, K. Y., Gu, M., Li, M., & Chung, S.
L. (2010). Energy-efficient key distribution using
electrocardiograph biometric set for secure com-
munications in wireless body healthcare networks.
Journal of Medical Systems,
1-9. doi:10.1007/
s10916-010-9467-2
Yongjin, W., Foteini, A., Dimitrios, H., & Kon-
stantinos, N. (2007). Analysis of human electro-
cardiogram for biometric recognition.
EURASIP
Journal on Advances in Signal Processing
, 2008.
Shoup, V. (2001). A proposal for an ISO standard
for public key encryption.
Manuscript
,
100
,
101-103.
Zhang, Y. T., & Shen, L. F. (2006).
Physiological
signal based entity authentication for body area
sensor networks and mobile healthcare systems
.
27
th
Annual International Conference of the IEEE
Engineering in Medicine and Biology Society
(EMBS '05) (pp. 2455-2458).
Singh, Y., & Gupta, P. (2009). Biometrics method
for human identification using electrocardiogram.
In
Proceedings of the 3
rd
International Conference
on Advances in Biometrics,
Alghero, Italy.
Stallings, W. (2003).
Cryptography and network
security
. Upper Saddle River, NJ: Prentice.
Search WWH ::
Custom Search