[1] |
MOVASSAGHI S, ABOLHASAN M, LIPMAN J.
Wireless body area networks:a survey[J]. IEEE Communications Survey & Tutorials, 2014, 16(3): 1658-1686.
|
[2] |
TEC. Behind the medical data leak who moved the patient's cheese[EB/OL].[2016-10-25]. http://www.ip-guard.net/blog/?p=1664. |
[3] |
SHI L, LI M, YU S.
Bana:Body area network authentication exploiting channel characteristics[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1803-1816.
doi: 10.1109/JSAC.2013.130913 |
[4] |
LIU J, ZHANG Z, CHEN X.
Certificateless remote Anonymous authentication schemes for wireless body area networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2): 332-342.
doi: 10.1109/TPDS.2013.145 |
[5] |
ZHAO Z.
An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem[J]. Journal of Medical Systems, 2014, 38(2): 1-7.
|
[6] |
韩坚华, 吴柳飞.
无线传感器网络EMSR协议的安全性分析[J]. 电子科技大学学报, 2009, 38(3): 401-405.
|
HAN Jian-hua, WU Liu-fei.
Analysis on security of EMSR protocol in wireless sensor network[J]. Journal of University of Electronic Science and Technology of China, 2009, 38(3): 401-405.
|
[7] |
贾晨军, 廖永建, 陈抗生.
无线传感器网络中的高效签名算法[J]. 电子科技大学学报, 2009, 38(4): 537-541.
|
JIA Chen-jun, LIAO Yong-jian, CHEN Kang-sheng.
Efficient signature algorithm in wireless sensor network[J]. Journal of University of Electronic Science and Technology of China, 2009, 38(4): 537-541.
|
[8] |
汪小芬, 李胜强, 肖国镇.
认证群密钥协商协议的安全性分析与改进[J]. 电子科技大学学报, 2009, 38(1): 51-54.
|
WANG Xiao-fen, LI Sheng-qiang, XIAO Guo-zhen.
Analysis and improvement of an authenticated group key agreement protocol[J]. Journal of University of Electronic Science and Technology of China, 2009, 38(1): 51-54.
|
[9] |
YI Ye-qing, LI Rui, CHEN Fei, et al. A digital watermarking approach to secureand precise range query processing in sensor networks[C]//IEEE Conference on Computer Communications(INFOCOM 2013). Turin, Italy:IEEE, 2013. |
[10] |
ZHANG Rui, SHI Jing, ZHANG Yan-chao.
Secure top-k query processing in unattended tiered sensor networks[J]. IEEE Transactions on Vehicular Technology (TVT), 2014, 9(63): 4681-4693.
|
[11] |
范永健, 陈红, 张晓莹.
两层传感器网络中可验证隐私保护的top-k查询协议[J]. 计算机学报, 2014, 37(4): 915-926.
|
FAN Yong-jian, CHEN Hong, ZHANG Xiao-ying.
Verifiable privacy-preserving top-k query protocol in two-tiered sensor networks[J]. Chinese Journal of Computers, 2014, 37(4): 915-926.
|
[12] |
LIAO X, LI J. Privacy-preserving and secure top-k query in two-tiered wireless sensor[C]//Proceedings of IEEE Global Communications Conference(GLOBECOM).[S.l.]:IEEE, 2012:335-341. |
[13] |
李睿, 林亚平, 易叶青.
两层传感器网络中安全Top-k查询协议[J]. 计算机研究与发展, 2012, 49(9): 1947-1958.
|
LI Rui, LIN Ya-ping, YI Ye-qing.
A secure top-k query protocol in two-tiered sensor networks[J]. Computer Research and Development, 2012, 49(9): 1947-1958.
|
[14] |
WONG W K, CHEUNG D W, KAO B, et al. Secure kNN computation on encrypted database[C]//the 2009 ACM SIGMOD International Conference on Management of Data (SIGMOD2009). New York:ACM, 2009:139-152. |
[15] |
YUAN Jia-wei, YU Shu-cheng. Efficient privacypreserving biometric identification in cloud computing[C]//IEEE Conference on Computer Communications. Turin, Italy:IEEE, 2013:2652-2660. |
[16] |
CAO Ning, WANG Cong, LI Ming, et al. Privacypreserving multi-keyword ranked search over encrypted cloud data[C]//2011 IEEE Conference on Computer Communications (INFOCOM2011).[S.l.]:IEEE, 2011:829-837. |