References
- Gostin LO, Turek-Brezina J, Powers M, Kozloff R, Faden R, Steinauer DD. Privacy and Security of Personal Information in a New Health Care System. JAMA. 270(20), 2487-2493 (1993) https://doi.org/10.1001/jama.1993.03510200093038
- J. Kim, A. R. Beresford, and F. Stajano, Towards a Security Policy for Ubiquitous Healthcare Systems, Proc. 1st International Conference on Ubiquitous Convergence Technology, 263-272 (2006)
- S.-D. Bao, Y.-T. Zhang, and L.-F. Shen, Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems, Proc. 27th Annual International Conference of Engineering in Medicine and Biology Society, 2455-2458 (2005)
- M. Markovic, Z. Savic, and B. Kovacevic, Secure mobile health systems: principles and solutions, M-Health: Emerging Mobile Health Systems, Kluwer Academic Publishers, 81-106 (2007)
- A. Boukerche and R. Yonglin, A secure mobile healthcare system using trust-based multicast scheme. IEEE J. Selected Areas Comm. 27(4), 387-399 (2009) https://doi.org/10.1109/JSAC.2009.090504
- B Schneier, Applied Cryptography, 2nd edn. (Wiley, New York, 1996)
- N. Koblitz, Elliptic curve cryptosystems, in Mathematics of Computation 48, 203-209 (1987) https://doi.org/10.1090/S0025-5718-1987-0866109-5
- C Ellison, B Schneier, Ten risks of PKI: what you're not being told about public-key infrastructure. Comput. Secur. J. 16(1), 1-7 (2000)
- H. Wang, B. Sheng, Q. Li, Elliptic curve cryptographybased access control in sensor networks, Int. J. Security and Networks. 1(3/4), 127-137 (2006) https://doi.org/10.1504/IJSN.2006.011772
- X. H. Le, S. Lee, I. Butun, M. Khalid, R. Sankar, M. Kim, M-H. Han, Y-K. Lee, H. Lee. An Energy-Efficient Access Control Scheme for Wireless Sensor Networks based on Elliptic Curve Cryptography. Journal of Communications and Networks. 11(6), 599-606 (2009) https://doi.org/10.1109/JCN.2009.6388413
- F. Amin, A. H. Jahangir, and H. Rasifard. Analysis of Public-Key Cryptography for Wireless Sensor Networks Security. World Academy of Science, Engineering and Technology 41, 529-534 (2008)
- X. H. Le, R. Sankar, M. Khalid, and S. Lee, Public Key Cryptography - based Security Scheme for Wireless Sensor Networks in Healthcare, 4th International Conference on Ubiquitous Information Management and Communication (ICUIMC), Suwon, Korea, (January 2010)
- W. Joppe, M. Kaihara, T. Kleinjung, A. K. Lenstra, and P. Montgomery, On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography Cryptology, Report on Cryptology ePrint Archive, 389 (2009)
- HJ Lee, SH Lee, KS Ha, HC Jang, WY Chung, JY Kim, YS Chang, DH Yoo. Ubiquitous healthcare service using Zigbee and mobile phone for elderly patients. International Journal of Medical Informatics. 78(3), 193-198 (2009) https://doi.org/10.1016/j.ijmedinf.2008.07.005
- A. Boukerche, Ren. Yonglin. A secure mobile healthcare system using trust-based multicast scheme. IEEE Journal on Selected Areas in Communications. 27(4), 387-399 (2009) https://doi.org/10.1109/JSAC.2009.090504
- TH Chen, WB Lee, HB Chen, A self-verification authentication mechanism for mobile satellite communication systems. Comput. Electr. Eng. 35(1), 41-48 (2009) https://doi.org/10.1016/j.compeleceng.2008.05.003
- GA Safdar, MP O'Neill, Performance analysis of novel randomly shifted certification authority authentication protocol for MANETs. EURASIP J. Wirel. Commun. Netw. 2009 Article ID 243956, 1-11 (2009)
- R Jian, L Yun, L Tongtong, SPM: source privacy for mobile ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2010 Article ID 534712, 1-10 (2010)
- V Vijay, O Diethelm, S Jaleel, JH Antoni, J Sanjay, Broadcast secrecy via key-chain-based encryption in single-hop wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2011 Article ID 695171, 1-12 (2011)
- JM Li, YH Park, X Li, A USIM-based uniform access authentication framework in mobile communication. EURASIP J. Wirel. Commun. Netw. 2011 Article ID 867315, 1-12 (2011)
- JY Huang, IE Liao, HW Tang, A forward authentication key management scheme for heterogeneous sensor networks. EURASIP J. Wirel. Commun. Netw. 2011 Article ID 296704, 1-10 (2011)
- EJ Yoon, KY Yoo, JW Hong, SY Yoon, DI Park, MJ Choi. An efficient and secure anonymous authentication scheme for mobile satellite communication systems. EURASIP Journal on Wireless Communications and Networking. 86, 1-15 (2011)
- N Sklavos, O Koufopavlou, Implementation of the SHA-2 hash family standard using FPGAs. J. Supercomput. 31(3), 227{248 (2005) https://doi.org/10.1007/s11227-005-0086-5
- R Oppliger, R Hauser, D Basin, SSL/TLS session-aware user authentication. IEEE Comput. 41(3), 59{65 (March 2008)