Author of the publication

Zero reconciliation secret key generation for body-worn health monitoring devices.

, , and . WISEC, page 39-50. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Nuts and Bolts of Micropayments: A Survey, , and . (2017)cite arxiv:1710.02964Comment: preprint.Authentication of lossy data in body-sensor networks for healthcare monitoring., , and . SECON, page 470-478. IEEE, (2012)A Per-Hop Security Scheme for Highly Dynamic Wireless Sensor Networks., , and . MASS, page 1005-1011. IEEE Computer Society, (2009)Zero reconciliation secret key generation for body-worn health monitoring devices., , and . WISEC, page 39-50. ACM, (2012)Cerberus: A Blockchain-Based Accreditation and Degree Verification System., , and . CoRR, (2019)Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough., , and . Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 225-233. Springer, (2018)End to End Security is Not Enough., and . Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 260-267. Springer, (2017)Bitcoin: Perils of an Unregulated Global P2P Currency., , and . Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 283-293. Springer, (2015)Hyper Metamorphism: Hyper Secure and Trustworthy 5G Networks using Blockchain with IoT., and . FIT, page 166-171. IEEE, (2023)ZombieCoin: Powering Next-Generation Botnets with Bitcoin., , , and . Financial Cryptography Workshops, volume 8976 of Lecture Notes in Computer Science, page 34-48. Springer, (2015)