ACM Transactions on Computer Systems (TOCS)
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Adding time to a logic of authentication
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Accountability in Electronic Commerce Protocols
IEEE Transactions on Software Engineering
An authentication logic supporting synchronization, revocation, and recency
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Electronic Submission Protocol Based on Temporal Accountability
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Accountability Issues in Multihop Message Communication
ASSET '99 Proceedings of the 1999 IEEE Symposium on Application - Specific Systems and Software Engineering and Technology
Privacy and Confidentiality in Healthcare Delivery Information System
CBMS '99 Proceedings of the 12th IEEE Symposium on Computer-Based Medical Systems
Recent-secure authentication: enforcing revocation in distributed systems
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
A wireless sensor network For structural monitoring
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
PeerReview: practical accountability for distributed systems
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Elliptic curve cryptography-based access control in sensor networks
International Journal of Security and Networks
A lightweight encryption and authentication scheme for wireless sensor networks
International Journal of Security and Networks
Analysis of routing security-energy trade-offs in wireless sensor networks
International Journal of Security and Networks
Load-balanced key establishment methodologies in wireless sensor networks
International Journal of Security and Networks
Limiting DoS attacks during multihop data delivery in wireless sensor networks
International Journal of Security and Networks
End-to-end security mechanisms for SMS
International Journal of Security and Networks
International Journal of Security and Networks
A self-encryption authentication protocol for teleconference services
International Journal of Security and Networks
An adaptive expert system approach for intrusion detection
International Journal of Security and Networks
Convertible identity-based anonymous designated ring signatures
International Journal of Security and Networks
Low-power authenticated group key agreement for heterogeneous wireless networks
International Journal of Security and Networks
A new signature scheme without random oracles
International Journal of Security and Networks
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
International Journal of Security and Networks
International Journal of Security and Networks
Workflow authorisation in mediator-free environments
International Journal of Security and Networks
Vulnerability analysis of certificate graphs
International Journal of Security and Networks
Secure scalable group signature with dynamic joins and separable authorities
International Journal of Security and Networks
A survey of key evolving cryptosystems
International Journal of Security and Networks
A taxonomy of internet traceback
International Journal of Security and Networks
An approach to synthesise safe systems
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
International Journal of Security and Networks
Building trust in peer-to-peer systems: a review
International Journal of Security and Networks
Secure collaborations over message boards
International Journal of Security and Networks
Low-cost wireless sensor networks for remote cardiac patients monitoring applications
Wireless Communications & Mobile Computing
Drifting Clock Model for Network Simulation in Time Synchronization
ICICIC '08 Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control
Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare
Wireless Communications & Mobile Computing
Flow-net methodology for accountability in wireless networks
IEEE Network: The Magazine of Global Internetworking
A Quantitative Study of Accountability in Wireless Multi-hop Networks
ICPP '10 Proceedings of the 2010 39th International Conference on Parallel Processing
Towards accountability for electronic patient records
CBMS'03 Proceedings of the 16th IEEE conference on Computer-based medical systems
Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
IEEE Communications Magazine
An efficient anonymous communication protocol for wireless sensor networks
Wireless Communications & Mobile Computing
Achieving Accountable MapReduce in cloud computing
Future Generation Computer Systems
Hi-index | 0.00 |
The increasing number of elderly patients in the world has lead to various new appliances and technologies in the modem tele-healthcare platform. One such application is the medical sensor network (MSN). In this application, patients are deployed with certain medical sensors and wearable devices and are remotely monitored by professionals. Thus, seeing a doctor in person is no longer the only option for those in need of medical care. Since it is also an economical way to reduce healthcare costs and save medical resources, we expect a robust, reliable, and scalable MSN in the near future. However, the time signal and temporal history in the current MSN are vulnerable due to unsecured infrastructure and transmission strategies. Meanwhile, the MSN may leak patients' identifications or other sensitive information that violates personal privacy. To make sure that the critical time signal is accountable, we propose a new architecture for the MSN that is capable of temporal accountability. In addition, it also preserves privacy ability via a Crowds anonymous system. The analysis results clearly indicate the advantages of being our proposed methods in terms of low-cost and reliable and having scalable features.