A survey on trust management for Internet of Things
Z Yan, P Zhang, AV Vasilakos - Journal of network and computer …, 2014 - Elsevier
Abstract Internet of Things (IoT) is going to create a world where physical objects are
seamlessly integrated into information networks in order to provide advanced and intelligent …
seamlessly integrated into information networks in order to provide advanced and intelligent …
Key management in wireless body area network: Challenges and issues
The miniaturization of wireless sensors and medical devices have empowered the extension
of Wireless Body Area Networks (WBANs) and E-Health care systems. However, in WBANs …
of Wireless Body Area Networks (WBANs) and E-Health care systems. However, in WBANs …
SecIoT: a security framework for the Internet of Things
The 5th generation wireless system (5G) will support Internet of Things (IoT) by increasing
the interconnectivity of electronic devices to support a variety of new and promising …
the interconnectivity of electronic devices to support a variety of new and promising …
Holitrust-a holistic cross-domain trust management mechanism for service-centric Internet of Things
Internet of Things (IoT) is proposed and used in diverse application domains. In IoT, nodes
commonly have a low capacity to maintain security on their own expenses, which increases …
commonly have a low capacity to maintain security on their own expenses, which increases …
[HTML][HTML] Key agreement schemes in wireless body area networks: Taxonomy and state-of-the-art
Advances in wearable and implantable biosensors have enabled the applicability and
usability of wireless body area networks (WBANs). A WBAN allows biosensors to collect and …
usability of wireless body area networks (WBANs). A WBAN allows biosensors to collect and …
User interactive internet of things privacy preserved access control
The Internet of Things (IoT) is a network of objects; it is enabled by the Internet technologies.
The IoT always collects sensitive data, but inadequate protection may lead to serious user …
The IoT always collects sensitive data, but inadequate protection may lead to serious user …
Gesture recognition by learning local motion signatures
MB Kaâniche, F Bremond - 2010 IEEE Computer Society …, 2010 - ieeexplore.ieee.org
This paper overviews a new gesture recognition framework based on learning local motion
signatures (LMSs) introduced by [5]. After the generation of these LMSs computed on one …
signatures (LMSs) introduced by [5]. After the generation of these LMSs computed on one …
[HTML][HTML] A broadcast-based key agreement scheme using set reconciliation for wireless body area networks
Abstract Information and communication technologies have thrived over the last few years.
Healthcare systems have also benefited from this progression. A wireless body area network …
Healthcare systems have also benefited from this progression. A wireless body area network …
An improved protocol for the password authenticated association of IEEE 802.15. 6 standard that alleviates computational burden on the node
The IEEE Std 802.15. 6 is an international standard for wireless body area networks
(WBANs). It contains many aspects of communications, and also provides security services …
(WBANs). It contains many aspects of communications, and also provides security services …
[PDF][PDF] Optimal adaptive genetic algorithm based hybrid signcryption algorithm for information security
R Sujatha, M Ramakrishnan… - … in Engineering and …, 2015 - cdn.techscience.cn
The functions of digital signature and public key encryption are simultaneously fulfilled by
signcryption, which is a cryptographic primitive. To securely communicate very large …
signcryption, which is a cryptographic primitive. To securely communicate very large …