2015
DOI: 10.1016/j.compeleceng.2015.03.030
|View full text |Cite
|
Sign up to set email alerts
|

An end-to-end secure key management protocol for e-health applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 67 publications
(28 citation statements)
references
References 18 publications
0
27
0
1
Order By: Relevance
“…The key is delivered over an out-of-band secure channel, and stored in the NFC phone's SE. The key agreement can be done by the key-establishment protocols [1,8,15,18]. …”
Section: Registration Phasementioning
confidence: 99%
“…The key is delivered over an out-of-band secure channel, and stored in the NFC phone's SE. The key agreement can be done by the key-establishment protocols [1,8,15,18]. …”
Section: Registration Phasementioning
confidence: 99%
“…While the precedent delegation approaches reduce the computational load at the constrained node, they break the end to end principle by requiring a third trusted party. Authors in (Abdmeziem and Tandjaoui, 2015), addressed the precedent issue by enhancing the existing schemes to ensure the end to end property.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we introduce an extension of our two previous approches (Abdmeziem and Tandjaoui, 2014) (Abdmeziem and Tandjaoui, 2015) to propose a new standard-based cooperative key management scheme. In fact, we design a new distributed hybrid mode for MIKEY protocol combining the Pre-shared key mode with the Public key mode.…”
Section: Introductionmentioning
confidence: 99%
“…WBAN applications [5,6] are growing and becoming more indispensable in people's lives due to the increasing accessability of network service and computing devices. Despite the great progress in networking and computing technology, security is one significant factor that influences users' choice of WBAN applications, since such applications involve a lot of personal information and therefore are vulnerable to security issues.…”
Section: Introductionmentioning
confidence: 99%