Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Hardware and Architecture,Software,Computer Science (miscellaneous)
Reference22 articles.
1. Jeong, Y.S.: RFID-based authentication protocol for implantable medical device. J. Digital Policy Manag. 10(2), 141–146 (2012)
2. Zhou, Y., Cao, Z., Lu, R.: Provably secure proxy-protected signature schemes based on factoring. J. Appl. Math. Comput. 164(1), 83–98 (2005)
3. Jeong, Y.S., Lee, S.H.: u-healthcare service authentication protocol based on RFID technology. J. Digital Policy Manag. 10(2), 153–160 (2012)
4. Miao, F., Jiang, L., Li, Y., Zhang, Y. T.: A novel biometrics based security solution for body sensor networks. In: Proceedings of 2nd International Conference on Biomedical Engineering and Informatics 2009 (BMEI ‘09), pp. 1–5 (2009)
5. Sudha, G., Ganesan, R.: Secure transmission medical data for pervasive healthcare system using Android. In: Proceedings of the 2013 International Conference on Communications and Signal Processing (ICCSP), pp. 433–436 (2013)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hacking and convergence computing;Journal of Computer Virology and Hacking Techniques;2017-10-29