Author of the publication

Authentication of lossy data in body-sensor networks for healthcare monitoring.

, , and . SECON, page 470-478. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security mechanisms for body sensor networks.. University of New South Wales, Sydney, Australia, (2011)base-search.net (ftunswworks:oai:unsworks.unsw.edu.au:1959.4/51658).Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring., , and . Future Gener. Comput. Syst., (2014)Bitcoin: Perils of an Unregulated Global P2P Currency (Transcript of Discussion).. Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 294-306. Springer, (2015)Decorrelating secret bit extraction via channel hopping in body area networks., , , and . PIMRC, page 1454-1459. IEEE, (2012)Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks., , and . EUC, page 644-650. IEEE Computer Society, (2010)Why Preventing a Cryptocurrency Exchange Heist Isn't Good Enough., , and . Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 225-233. Springer, (2018)End to End Security is Not Enough., and . Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 260-267. Springer, (2017)Bitcoin: Perils of an Unregulated Global P2P Currency., , and . Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 283-293. Springer, (2015)Hyper Metamorphism: Hyper Secure and Trustworthy 5G Networks using Blockchain with IoT., and . FIT, page 166-171. IEEE, (2023)ZombieCoin: Powering Next-Generation Botnets with Bitcoin., , , and . Financial Cryptography Workshops, volume 8976 of Lecture Notes in Computer Science, page 34-48. Springer, (2015)