-
1
-
-
38149092768
-
-
Health Monitoring System
-
PHMon: Personal Health Monitoring System, http://www.phmon.de/englisch
-
Personal
-
-
PHMon1
-
2
-
-
0141972410
-
Research Issues in Ad-Hoc Distributed Personal Networking
-
Niemegeers, I.G., de Groot, S.M.H.: Research Issues in Ad-Hoc Distributed Personal Networking. Wireless Personal Communications 26(2-3), 149-167 (2003)
-
(2003)
Wireless Personal Communications
, vol.26
, Issue.2-3
, pp. 149-167
-
-
Niemegeers, I.G.1
de Groot, S.M.H.2
-
4
-
-
84958246461
-
Securely control Infusion Pumps via Internet for efficient Remote Therapy of Pain
-
Seoul
-
Grossmann, U., Schiessl, C., Jatobá, L., Ottenbacher, J., W., S., Mueller-Glaser, K.: Securely control Infusion Pumps via Internet for efficient Remote Therapy of Pain. In: IFMBE Proceedings of the World Congress on Medical Physics and Biomedical Engineering, Seoul, vol. 14 (2006)
-
(2006)
IFMBE Proceedings of the World Congress on Medical Physics and Biomedical Engineering
, vol.14
-
-
Grossmann, U.1
Schiessl, C.2
Jatobá, L.3
Ottenbacher, J.W.S.4
Mueller-Glaser, K.5
-
6
-
-
0035395659
-
Facing the challenge of wireless security
-
Miller, S.: Facing the challenge of wireless security. Computer 34(7), 16-18 (2001)
-
(2001)
Computer
, vol.34
, Issue.7
, pp. 16-18
-
-
Miller, S.1
-
7
-
-
2342603906
-
-
Ravi, S., Raghunathan, A., Chakradhar, S.: Embedding security in wireless embedded systems. In: VLSI Design, 2003. Proceedings. 16th International Conference on (2003), pp. 269-270 (2003)
-
Ravi, S., Raghunathan, A., Chakradhar, S.: Embedding security in wireless embedded systems. In: VLSI Design, 2003. Proceedings. 16th International Conference on (2003), pp. 269-270 (2003)
-
-
-
-
8
-
-
85150454638
-
Embedded end-to-end wireless security with ECDH key exchange
-
Kumar, S., Girimondo, M., Weimerskirch, A., Paar, C., Patel, A., Wander, A.: Embedded end-to-end wireless security with ECDH key exchange. In: Circuits and Systems, 2003. MWSCAS '03. Proceedings of the 46th IEEE International Midwest Symposium, vol. 2, pp. 786-789 (2003)
-
(2003)
Circuits and Systems, 2003. MWSCAS '03. Proceedings of the 46th IEEE International Midwest Symposium
, vol.2
, pp. 786-789
-
-
Kumar, S.1
Girimondo, M.2
Weimerskirch, A.3
Paar, C.4
Patel, A.5
Wander, A.6
-
9
-
-
84876375076
-
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks
-
Buttyán, L, Gligor, V, Westhoff, D, eds, Security and Privacy in Ad-Hoc and Sensor Networks, Springer, Heidelberg
-
Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. In: Buttyán, L., Gligor, V., Westhoff, D. (eds.) Security and Privacy in Ad-Hoc and Sensor Networks. LNCS, vol. 4357, pp. 6-17. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4357
, pp. 6-17
-
-
Batina, L.1
Mentens, N.2
Sakiyama, K.3
Preneel, B.4
Verbauwhede, I.5
-
10
-
-
33745460536
-
-
Smyth, N., McLoone, M., McCanny, J.: Reconfigurable cryptographic RISC microprocessor. In: VLSI Design, Automation and Test (VLSI-TSA-DAT). 2005 IEEE VLSI-TSA International Symposium on (2005), pp. 29-32 (2005)
-
Smyth, N., McLoone, M., McCanny, J.: Reconfigurable cryptographic RISC microprocessor. In: VLSI Design, Automation and Test (VLSI-TSA-DAT). 2005 IEEE VLSI-TSA International Symposium on (2005), pp. 29-32 (2005)
-
-
-
-
12
-
-
33750436929
-
About malicious software in smartphones
-
Töyssy, S., Helenius, M.: About malicious software in smartphones. Journal in Computer Virology 2(2), 109-119 (2006)
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.2
, pp. 109-119
-
-
Töyssy, S.1
Helenius, M.2
|