Wei Ren Liangli Ma

Y Ren - Security and Privacy in Internet of Things (IoTs) - api.taylorfrancis.com
With the development and deployment of the Internet of Things (IoT), some key personal
applications attract more and more attention, for example, wireless body sensor networks …

FREKA: Fast Resource Efficient Key Agreement Algorithm within Body Area Network

Y Al-Saeed, E Eldaydamony, O Ouda… - Mansoura Journal for …, 2019 - journals.ekb.eg
Body area network (BAN) considered a hot research topic and attracted many researchers
due to its increasing applications. Providing light, fast and efficient key agreement algorithm …

[PDF][PDF] Authenticated Group Key Agreement Protocols for Error Detection and Correction

K Ravikumar, NP Sureshkumar - 2019 - academia.edu
Group verification and essential deal represents an essential position in security. The
important thing deal methods must promise confidentiality and reliability of message …

Lightweight and Robust Schemes for Privacy Protection in Key Personal IoT Applications: Mobile WBSN and Participatory Sensing

W Ren, L Ma, Y Ren - Security and Privacy in Internet of Things …, 2016 - taylorfrancis.com
With the development and deployment of the Internet of Things (IoT), some key personal
applications attract more and more attention, for example, wireless body sensor networks …

An Improved Lightweight Privacy Preserving Authentication Scheme for SIP-Based-VoIP Using Smart Card (MPhil–Dissertation)

SU Jan, F Qayum - Available at SSRN 3351852, 2016 - papers.ssrn.com
In the past few years, secure information sharing became very popular in the area of
immigration, military applications, healthcare, education, foreign affairs, etc. As secure …

Accumulative Secure Group Association in an Ad-hoc and Ubiquitous Network (Version 3.0)

O Chagnaadorj, J Tanaka - Journal of information processing, 2015 - jstage.jst.go.jp
The increased popularity of mobile devices, such as laptops, mobile phones, tablets,
accessory devices, and more, brings new challenges in the area of network security in the …

[PDF][PDF] Using User-aided Authentication to Secure an Ad-hoc and Ubiquitous Network

O Chagnaadorj - 2014 - tsukuba.repo.nii.ac.jp
The increased popularity of mobile devices, such as laptops, mobile phones, tablets,
accessory devices, and more, brings new challenges in the area of network security. In …

[PDF][PDF] Information fusion of seafloor observatory network

Y Wang, Z Wang, X Fan, F Yuan - 2015 - Citeseer
The necessity and advantages of the multi-sensor's application in information fusion is
analyzed on the basis of that multi-sensor information fusion technology has been widely …

[PDF][PDF] ESKA: A Highly Reliable Authentication Protocol Based-on One-way Key Chain for WSN Broadcast

Q Wang, R Li, L Lai, L Kong - … Journal on Smart Sensing and Intelligent …, 2013 - sciendo.com
The authentication of broadcast sources is one of the most important research issues in the
area of network security. To confirm that the control information received is from the genuine …

Enhanced Key Management Protocol in Body Area Networks

J Shen, S Moh, I Chung - 한국멀티미디어학회학술발표논문집, 2010 - dbpia.co.kr
Body Area Networks (BANs) have emerged as an enabling technique for e-healthcare
systems, in which the data of a patient'vital body parameters and movements can be …