[1] |
LORINCZ K , MALAN D J , FULFORD-JONES T R F , et al. Sensor networks for emergency response:challenges and opportunities[J]. Pervasive Computing,IEEE, 2004,3(4):16-23.
|
[2] |
AXISA F , GEHIN C , DELHOMME G , et al. Wrist ambulatory moni-toring system and smart glove for real time emotional,sensorial and physiological analysis[C]//Proceedings of Engineering in Medicine and Biology Society, 26th Annual International Conference of the IEEE. 2004,1:2161-2164.
|
[3] |
MUNDT C W , MONTGOMERY K N , UDOH U E , et al. A multi-parameter wearable physiologic monitoring system for space and ter-restrial applications[J]. IEEE Transactions on Information Technology in Biomedicine, 2005,9(3):382-391.
|
[4] |
VENKATASUBRAMANIAN K K , BANERJEE A , GUPTA S K S . PSKA:usable and secure key agreement scheme for body area net-works[J]. IEEE Transactions on Information Technology in Biomedi-cine, 2010,14(1):60-68.
|
[5] |
BAO S D , POON C C Y , ZHANG Y T , et al. Using the timing infor-mation of heartbeats as an entity identifier to secure body sensor net-work[J]. IEEE Transactions on Information Technology in Biomedi-cine, 2008,12(6):772-779.
|
[6] |
WANG H , FANG H , XING L , et al. An integrated biometric-based security framework using wavelet-domain HMM in wireless body area networks(WBAN)[C]//2011 IEEE International Conference on Pro-ceedings of Communications. 2011:1-5.
|
[7] |
朱凯 . 无线体域网身份认证方法研究[D]. 西安: 西安电子科技大学, 2013. ZHU K . Research on methods of identity authentication for wireless body area network[D]. Xi'an: Xidian University, 2013.
|
[8] |
JANG C , LEE D G , HAN J . A proposal of security framework for wireless body area network[C]//SECTECH'08 International Confer-ence on Security Technology. 2008:202-205.
|
[9] |
DRIRA W , RENAULT E , ZEGHLACHE D . A hybrid authentication and key establishment scheme for wban[C]// 2012 IEEE 11th Interna-tional Conference on Trust,Security and Privacy in Computing and Communications (TrustCom). 2012:78-83.
|
[10] |
ZHAO Z . An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem[J]. Journal of Medical Systems, 2014,38(2):1-7.
|
[11] |
Al-RIYAMI S S , PATERSON K G . Certificateless public key cryp-tography[M], Advances in Cryptology-Asiacrypt 2003. Springer Ber-lin Heidelberg, 2003:452-473.
|
[12] |
LIU J , ZHANG Z , CHEN X , et al. Certificateless remote anonymous authentication schemes for wireless body area networks[J]. IEEE Trans-actions on Parallel and Distributed Systems, 2014,25(2):332-342.
|
[13] |
XIONG H . Cost-effective scalable and anonymous certificateless remote authentication protocol[J]. IEEE Transactions on Information Forensics and Security, 2014,9(12):2327-2339.
|
[14] |
ZHANG L , LIU J , SUN R . An efficient and lightweight certificateless authentication protocol for wireless body area networks[C]//2013 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS). 2013:637-639.
|
[15] |
BICHSEL P , CAMENISCH J , GRO? T , et al. Anonymous credentials on a standard java card[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. 2009:600-610.
|
[16] |
ARMKNECHT F , CHEN L , SADEGHI A R , et al. Anonymous au-thentication for RFID systems[C]//Radio Frequency Identification:Security and Privacy Issues. 2010:158-175.
|
[17] |
TIAN Y , PENG Y B , YANG Y L , et al. Attribute-based encryption access control scheme in wireless body area networks[J]. Application Research of Computers, 2015,32(7): 2163-2167.
|
[18] |
ZHANG X B , YUAN K G , WU C H , et al. Research of wireless body area network(WBAN) security[C]//The Ninth Academic Annual Con-ference of China Communication Association. 2012.
|
[19] |
CHAUM D , VAN H E . Group signatures[C]//Advances in Cryptol-ogy—EUROCRYPT'91. 1991:257-265.
|
[20] |
CHEN H , ZHU C J , SONG R S . Efficient certificateless signature and group signature schemes[J]. Journal of Computer Research and De-velpoment, 2010,47(2):231-237.
|