-
1
-
-
52149109859
-
-
Assited Living Project Web page at University of Illinois at Urbana-Champaign
-
Assited Living Project Web page at University of Illinois at Urbana-Champaign, http://lion.cs.uiuc.edu/assistedliving/index.html
-
-
-
-
2
-
-
34548134027
-
I-Living: An Open System Architecture for Assisted Living
-
Wang, Q., Shin, W., Liu, X., Zeng, Z., Oh, C., Li, B.A., Caccamo, M., Gunter, C., Gunter, E., Hou, J., Karahalios, K., Sha, L.: I-Living: An Open System Architecture for Assisted Living. In: Proceedings of IEEE SMC (2006), http://lion.cs.uiuc.edu/assistedliving/publications/I-Living.pdf
-
(2006)
Proceedings of IEEE SMC
-
-
Wang, Q.1
Shin, W.2
Liu, X.3
Zeng, Z.4
Oh, C.5
Li, B.A.6
Caccamo, M.7
Gunter, C.8
Gunter, E.9
Hou, J.10
Karahalios, K.11
Sha, L.12
-
3
-
-
85000321643
-
-
University of Rochester
-
University of Rochester, Center of Future Health, http://www. futurehealth.rochester.edu/news/
-
Center of Future Health
-
-
-
4
-
-
18144412162
-
-
Georgia Institute of Technology
-
Georgia Institute of Technology, Aware Home, http://www.cc.gatech.edu/ fce/ahri/
-
Aware Home
-
-
-
5
-
-
34548111141
-
-
University of Virginia
-
University of Virginia, Smart In-Home Monitoring System, http://marc.med.virginia.edu/projectssmarthomemonitor.html
-
Home Monitoring System
-
-
Smart, I.1
-
6
-
-
34547319238
-
-
Intel Corporation, Age-in-Place, http://www.intel.com/research/prohealth/ cs-aginginplace.htm
-
Age-in-Place
-
-
-
7
-
-
38049022011
-
-
Durresi, A., Durresi, M., Barolli, L.: Integrated Biomedical System for ubiquitous Health Monitoring. In: Enokido, T., Barolli, L., Takizawa, M. (eds.) NBiS 2007. LNCS, 4658, pp. 397-405. Springer, Heidelberg (2007)
-
Durresi, A., Durresi, M., Barolli, L.: Integrated Biomedical System for ubiquitous Health Monitoring. In: Enokido, T., Barolli, L., Takizawa, M. (eds.) NBiS 2007. LNCS, vol. 4658, pp. 397-405. Springer, Heidelberg (2007)
-
-
-
-
8
-
-
33947312221
-
-
online
-
Cellularonline, http://www.cellular.co.za
-
Cellular
-
-
-
9
-
-
52149122864
-
-
http://www.networkworld.com/news/2004/072604avaya.html
-
-
-
-
10
-
-
52149108630
-
-
http://www.pcworld.com/news/article/0,aid,116334,00.asp
-
http://www.pcworld.com/news/article/0,aid,116334,00.asp
-
-
-
-
11
-
-
33749984009
-
Security in ad hoc networks on cellular phones for emergency situations
-
Durresi, A., Bulusu, V., Paruchuri, V.: Security in ad hoc networks on cellular phones for emergency situations. Ad Hoc Networks Journal 5(1), 126-133 (2007)
-
(2007)
Ad Hoc Networks Journal
, vol.5
, Issue.1
, pp. 126-133
-
-
Durresi, A.1
Bulusu, V.2
Paruchuri, V.3
-
12
-
-
0033332268
-
Secure communication mechanisms for gsm networks
-
Lo, C., Chen, Y.: Secure communication mechanisms for gsm networks. IEEE Transaction on Consumer Electronics 45(4), 1074-1080 (1999)
-
(1999)
IEEE Transaction on Consumer Electronics
, vol.45
, Issue.4
, pp. 1074-1080
-
-
Lo, C.1
Chen, Y.2
-
13
-
-
0032124041
-
Mobility and security management in the gsm system and some proposed future improvements
-
Mehrotra, A., Golding, L.: Mobility and security management in the gsm system and some proposed future improvements. Proceedings of the IEEE 86(7), 1480-1497 (1998)
-
(1998)
Proceedings of the IEEE
, vol.86
, Issue.7
, pp. 1480-1497
-
-
Mehrotra, A.1
Golding, L.2
-
14
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
-
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
15
-
-
23044435711
-
Short signatures from the weil pairing
-
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryp-tol. 17(4), 297-319 (2004)
-
(2004)
J. Cryp-tol
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
16
-
-
84947242701
-
Toward hierarchical identity-based encryption
-
Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
-
Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
18
-
-
0037615371
-
-
ISBN: 3-540-41654-4, August 9, Springer, Heidelberg
-
Spencer, J.: The Strange Logic of Random Graphs ISBN: 3-540-41654-4, August 9, 2001. Springer, Heidelberg (2001)
-
(2001)
The Strange Logic of Random Graphs
-
-
Spencer, J.1
-
19
-
-
27644517087
-
Key Distribution Techniques for Sensor Networks
-
ISBN:1-4020-7883-8
-
Chan, H., Perrig, A., Song, D.: Key Distribution Techniques for Sensor Networks. Wireless Sensor Networks, 277-303 ISBN:1-4020-7883-8
-
Wireless Sensor Networks
, pp. 277-303
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
20
-
-
0038487088
-
Random Key Predistribution Schemes for Sensor Networks
-
May 11-14
-
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, May 11-14, 2003, pp. 197-213 (2003)
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
21
-
-
8344262333
-
-
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge. In: Proceedings of the IEEE INFOCOM 2004, March 7-11,2004, pp. 586-597 (2004)
-
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge. In: Proceedings of the IEEE INFOCOM 2004, March 7-11,2004, pp. 586-597 (2004)
-
-
-
-
23
-
-
3042822764
-
Establishing Pairwise Keys in Distributed Sensor Networks
-
October, pp
-
Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. In: 10th ACM conference on Computers and Communication Security (CCS 2003), October, pp. 52-61 (2003)
-
(2003)
10th ACM conference on Computers and Communication Security (CCS
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
24
-
-
10044284351
-
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
-
October
-
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: 10th ACM conference on Computers and Communication Security (CCS 2003), pp. 62-72 (October 2003)
-
(2003)
10th ACM conference on Computers and Communication Security (CCS
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
25
-
-
77951539120
-
Key distribution for heterogeneous mobile wireless networks
-
San Francisco, November 27, December 1
-
Durresi, A., Bulusu, V., Durresi, M., Paruchuri, V., Jain, R.: Key distribution for heterogeneous mobile wireless networks. In: Proceeding of Globecom 2006, San Francisco, November 27 - December 1 (2006) WSN09-4: 1-5
-
(2006)
Proceeding of Globecom
-
-
Durresi, A.1
Bulusu, V.2
Durresi, M.3
Paruchuri, V.4
Jain, R.5
-
26
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Zhang, Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. Wireless Networks 9(5), 545-556 (2003)
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.A.3
-
27
-
-
32844474282
-
The smart phone: A ubiquitous input device
-
Ballagas, R., Rohs, M., Sheridan, J., Borchers, J.: The smart phone: A ubiquitous input device. IEEE Pervasive Computing 5(1), 70-77 (2006)
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.1
, pp. 70-77
-
-
Ballagas, R.1
Rohs, M.2
Sheridan, J.3
Borchers, J.4
-
28
-
-
30144440941
-
Dempster-shafer theory for intrusion detection in ad hoc networks
-
Chen, T.M., Venkataramanan, V.: Dempster-shafer theory for intrusion detection in ad hoc networks. IEEE Internet Computing 9(6), 35-41 (2005)
-
(2005)
IEEE Internet Computing
, vol.9
, Issue.6
, pp. 35-41
-
-
Chen, T.M.1
Venkataramanan, V.2
|