A review on body area networks security for healthcare

GH Zhang, CCY Poon, YT Zhang - … Scholarly Research Notices, 2011‏ - Wiley Online Library
Body area networks (BANs) are emerging as one of the main research trends in recent
years, particularly in the area of personal health monitoring. Since health data are private …

[PDF][PDF] A survey on elliptic curve cryptography for pervasive computing environment

V Katiyar, K Dutta, S Gupta - International Journal of Computer …, 2010‏ - Citeseer
In today‟ s era of the ubiquitous computing, the Internet has become the main mode of data
communication. Most of the devices used in wireless/mobile environments, that form …

A secure and efficient authentication protocol in wireless sensor network

K Chatterjee, A De, D Gupta - Wireless Personal Communications, 2015‏ - Springer
With increasing popularity of wireless sensor networks (WSN), the security issues related to
such networks have become crucial. Most of the networks use shared key among all the …

An improved ID-Based key management scheme in wireless sensor network

K Chatterjee, A De, D Gupta - … , ICSI 2012, Shenzhen, China, June 17-20 …, 2012‏ - Springer
Key management is one of the critical areas in WSN as limited resources of sensor nodes
restrict the use of conventional security techniques. Most of the sensor networks use shared …

[PDF][PDF] Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices.

K Chatterjee, A De, D Gupta - Int. J. Netw. Secur., 2013‏ - ijns.jalaxy.com.tw
Abstract Hyperelliptic Curve Cryptosystem (HECC) is well suited for secure communication
in wireless sensor network as limited resources (storage, time or power) on sensor nodes …

[PDF][PDF] Security software engineering in wireless sensor networks

E Platon, Y Sei - Progress in Informatics, 2008‏ - Citeseer
The engineering of security is an essential discipline in Software engineering. It requires
one to embrace a holistic approach, as any weakness along the engineering process of the …

[PDF][PDF] An efficient authentication protocol based on elliptic curve cryptography for mobile networks

PG Rajeswari, K Thilagavathi - IJCSNS, 2009‏ - idc-online.com
Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically,
mobile networks are deployed in un-trusted environments. Such networks in this day and …

An enhanced elliptic curve cryptography for biometric

OS Althobaiti, HA Aboalsamh - 2012 7th International …, 2012‏ - ieeexplore.ieee.org
Cryptography is one of the important sciences in the current era. The importance of
cryptography comes from the intensive digital transactions which we daily perform on the …

Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem

EH El Kinani, F Amounas - Computer Engineering and …, 2013‏ - comengapp.unsri.ac.id
Abstract In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of
researchers due to its robust mathematical structure and highest security compared to other …

Optimized elliptic curve cryptography for wireless sensor networks

S Bala, G Sharma, AK Verma - 2012 2nd IEEE International …, 2012‏ - ieeexplore.ieee.org
Recent technical advances have made it possible to develop such devices, which are small
in size, cheap and capable of wireless communication using radio interfaces and provide …