A review on body area networks security for healthcare
Body area networks (BANs) are emerging as one of the main research trends in recent
years, particularly in the area of personal health monitoring. Since health data are private …
years, particularly in the area of personal health monitoring. Since health data are private …
[PDF][PDF] A survey on elliptic curve cryptography for pervasive computing environment
In today‟ s era of the ubiquitous computing, the Internet has become the main mode of data
communication. Most of the devices used in wireless/mobile environments, that form …
communication. Most of the devices used in wireless/mobile environments, that form …
A secure and efficient authentication protocol in wireless sensor network
With increasing popularity of wireless sensor networks (WSN), the security issues related to
such networks have become crucial. Most of the networks use shared key among all the …
such networks have become crucial. Most of the networks use shared key among all the …
An improved ID-Based key management scheme in wireless sensor network
Key management is one of the critical areas in WSN as limited resources of sensor nodes
restrict the use of conventional security techniques. Most of the sensor networks use shared …
restrict the use of conventional security techniques. Most of the sensor networks use shared …
[PDF][PDF] Mutual Authentication Protocol Using Hyperelliptic Curve Cryptosystem in Constrained Devices.
Abstract Hyperelliptic Curve Cryptosystem (HECC) is well suited for secure communication
in wireless sensor network as limited resources (storage, time or power) on sensor nodes …
in wireless sensor network as limited resources (storage, time or power) on sensor nodes …
[PDF][PDF] Security software engineering in wireless sensor networks
The engineering of security is an essential discipline in Software engineering. It requires
one to embrace a holistic approach, as any weakness along the engineering process of the …
one to embrace a holistic approach, as any weakness along the engineering process of the …
[PDF][PDF] An efficient authentication protocol based on elliptic curve cryptography for mobile networks
PG Rajeswari, K Thilagavathi - IJCSNS, 2009 - idc-online.com
Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically,
mobile networks are deployed in un-trusted environments. Such networks in this day and …
mobile networks are deployed in un-trusted environments. Such networks in this day and …
An enhanced elliptic curve cryptography for biometric
Cryptography is one of the important sciences in the current era. The importance of
cryptography comes from the intensive digital transactions which we daily perform on the …
cryptography comes from the intensive digital transactions which we daily perform on the …
Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem
Abstract In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of
researchers due to its robust mathematical structure and highest security compared to other …
researchers due to its robust mathematical structure and highest security compared to other …
Optimized elliptic curve cryptography for wireless sensor networks
Recent technical advances have made it possible to develop such devices, which are small
in size, cheap and capable of wireless communication using radio interfaces and provide …
in size, cheap and capable of wireless communication using radio interfaces and provide …