Articles with "inherent security" as a keyword



Photo from wikipedia

A Novel Protocol with Patient and Node Identification for Optical WBAN with Inherent Security and Interference Rejection

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-4075-9

Abstract: The wireless body area network (WBAN) has emerged as a new technology for e-healthcare that allows real time monitoring of patients using miniaturized wearable and implantable sensors. An important concern in such networks is the… read more here.

Keywords: interference rejection; patient node; node identification; security interference ... See more keywords
Photo by testalizeme from unsplash

Comment on ‘Inherent security of phase coding quantum key distribution systems against detector blinding attacks’ (2018 Laser Phys. Lett. 15 095203)

Sign Up to like & get
recommendations!
Published in 2018 at "Laser Physics Letters"

DOI: 10.1088/1612-202x/aaf22d

Abstract: This is a brief comment on the Letter by Balygin and his coworkers [Laser Phys. Lett. 15, 095203 (2018)]. We point out an error that invalidates the Letter's conclusions. read more here.

Keywords: laser phys; comment inherent; phys lett; lett 095203 ... See more keywords