1. Anoop, M- S. (2007). Elliptic Curve Cryptography - an implementation tutorial. Technical report, Tata Elxsi Ltd.
2. Information security and privacy in healthcae: Current state of research;Appari;International Journal of Internet and Enterprise Management,2010
3. Bao, S- D., Zhang, Y- T. & Shen, L- F. (2005). Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems. In Proceedings of the 27th Annual International Conference of the Engineering in Medicine and Biology Society (pp. 2455–2458), China.
4. Brute-force attack “Seeking but Distressing”;Dave;International Journal of Innovations in Engineering and Technology,2013
5. Hu, C., Cheng, X., Zhang, F., Wu, D., Liao, X. & Chen, D. (2013). OPFKA: Secure and Efficient Ordered-Physiological-Feature-based Key Agreement for Wireless Body Area Networks. In Proceedings of the 32nd IEEE International Conference on Computer Communications (pp. 2275–2282), Turin.