[PDF][PDF] Wireless body area networks for healthcare: A survey
Wireless body area networks (WBANs) are emerging as important networks, applicable in
various fields. This paper surveys the WBANs that are designed for applications in …
various fields. This paper surveys the WBANs that are designed for applications in …
Advances and challenges of wireless body area networks for healthcare applications
The term wireless body area network (WBAN) is used to describe a network of devices
connected wirelessly for communication on, in and near the body. In this paper, we survey …
connected wirelessly for communication on, in and near the body. In this paper, we survey …
[图书][B] RFID and sensor networks: architectures, protocols, security, and integrations
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations is the
authoritative reference on RFID and WSNs. Covering a broad range of topics that includes …
authoritative reference on RFID and WSNs. Covering a broad range of topics that includes …
Private key agreement and secure communication for heterogeneous sensor networks
SMM Rahman, K El-Khatib - Journal of Parallel and Distributed Computing, 2010 - Elsevier
Key management is an important building block for all security operations in sensor
networks. Most existing key management schemes try to establish shared keys for all pairs …
networks. Most existing key management schemes try to establish shared keys for all pairs …
A practical second-order fault attack against a real-world pairing implementation
J Blömer, RG Da Silva, P Günther… - 2014 Workshop on …, 2014 - ieeexplore.ieee.org
Several fault attacks against pairing-based cryptography have been described theoretically
in recent years. Interestingly, none of these has been practically evaluated. We accomplish …
in recent years. Interestingly, none of these has been practically evaluated. We accomplish …
Secure data transmission protocol for medical wireless sensor networks
Wireless Sensor Networks (WSN) have attracted much interest in the last decade. It opened
a new range of applications such as large area monitoring including environmental …
a new range of applications such as large area monitoring including environmental …
Applicability of public key infrastructures in wireless sensor networks
Abstract Wireless Sensor Networks (WSN) are becoming a key technology in the support of
pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSN” …
pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSN” …
Data security in vehicular communication networks
A Weimerskirch, JJ Haas, YC Hu… - … Applications and Inter …, 2010 - Wiley Online Library
Information technology has gained central importance for many new automotive applications
and services. The costs for software and electronics are estimated to approach the 50 …
and services. The costs for software and electronics are estimated to approach the 50 …
Why cryptography should not rely on physical attack complexity
J Krämer - it-Information Technology, 2017 - degruyter.com
This work presents two implementation attacks against cryptographic algorithms. Based on
these two presented attacks, this thesis shows that the assessment of physical attack …
these two presented attacks, this thesis shows that the assessment of physical attack …
Parametric yield analysis and constrained-based supply voltage optimization
Parametric yield loss has become a serious concern in leakage dominated technologies.
We discuss the impact of leakage on parametric yield and show that leakage can cause …
We discuss the impact of leakage on parametric yield and show that leakage can cause …