메뉴 건너뛰기




Volumn 5186 LNCS, Issue , 2008, Pages 273-282

Secure ubiquitous health monitoring system

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CELLULAR NEURAL NETWORKS; CELLULAR TELEPHONE SYSTEMS; COMPUTER CRIME; HEALTH; INFORMATION SCIENCE; INFORMATION SYSTEMS; MOBILE PHONES; SENSOR NETWORKS; STRUCTURES (BUILT OBJECTS); TELECOMMUNICATION EQUIPMENT; TELEPHONE; TELEPHONE CIRCUITS; TELEPHONE SETS; WIRELESS SENSOR NETWORKS;

EID: 52149112547     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85693-1_29     Document Type: Conference Paper
Times cited : (2)

References (28)
  • 1
    • 52149109859 scopus 로고    scopus 로고
    • Assited Living Project Web page at University of Illinois at Urbana-Champaign
    • Assited Living Project Web page at University of Illinois at Urbana-Champaign, http://lion.cs.uiuc.edu/assistedliving/index.html
  • 3
    • 85000321643 scopus 로고    scopus 로고
    • University of Rochester
    • University of Rochester, Center of Future Health, http://www. futurehealth.rochester.edu/news/
    • Center of Future Health
  • 4
    • 18144412162 scopus 로고    scopus 로고
    • Georgia Institute of Technology
    • Georgia Institute of Technology, Aware Home, http://www.cc.gatech.edu/ fce/ahri/
    • Aware Home
  • 5
    • 34548111141 scopus 로고    scopus 로고
    • University of Virginia
    • University of Virginia, Smart In-Home Monitoring System, http://marc.med.virginia.edu/projectssmarthomemonitor.html
    • Home Monitoring System
    • Smart, I.1
  • 6
    • 34547319238 scopus 로고    scopus 로고
    • Intel Corporation, Age-in-Place, http://www.intel.com/research/prohealth/ cs-aginginplace.htm
    • Age-in-Place
  • 7
    • 38049022011 scopus 로고    scopus 로고
    • Durresi, A., Durresi, M., Barolli, L.: Integrated Biomedical System for ubiquitous Health Monitoring. In: Enokido, T., Barolli, L., Takizawa, M. (eds.) NBiS 2007. LNCS, 4658, pp. 397-405. Springer, Heidelberg (2007)
    • Durresi, A., Durresi, M., Barolli, L.: Integrated Biomedical System for ubiquitous Health Monitoring. In: Enokido, T., Barolli, L., Takizawa, M. (eds.) NBiS 2007. LNCS, vol. 4658, pp. 397-405. Springer, Heidelberg (2007)
  • 8
    • 33947312221 scopus 로고    scopus 로고
    • online
    • Cellularonline, http://www.cellular.co.za
    • Cellular
  • 9
    • 52149122864 scopus 로고    scopus 로고
    • http://www.networkworld.com/news/2004/072604avaya.html
  • 10
    • 52149108630 scopus 로고    scopus 로고
    • http://www.pcworld.com/news/article/0,aid,116334,00.asp
    • http://www.pcworld.com/news/article/0,aid,116334,00.asp
  • 11
    • 33749984009 scopus 로고    scopus 로고
    • Security in ad hoc networks on cellular phones for emergency situations
    • Durresi, A., Bulusu, V., Paruchuri, V.: Security in ad hoc networks on cellular phones for emergency situations. Ad Hoc Networks Journal 5(1), 126-133 (2007)
    • (2007) Ad Hoc Networks Journal , vol.5 , Issue.1 , pp. 126-133
    • Durresi, A.1    Bulusu, V.2    Paruchuri, V.3
  • 12
    • 0033332268 scopus 로고    scopus 로고
    • Secure communication mechanisms for gsm networks
    • Lo, C., Chen, Y.: Secure communication mechanisms for gsm networks. IEEE Transaction on Consumer Electronics 45(4), 1074-1080 (1999)
    • (1999) IEEE Transaction on Consumer Electronics , vol.45 , Issue.4 , pp. 1074-1080
    • Lo, C.1    Chen, Y.2
  • 13
    • 0032124041 scopus 로고    scopus 로고
    • Mobility and security management in the gsm system and some proposed future improvements
    • Mehrotra, A., Golding, L.: Mobility and security management in the gsm system and some proposed future improvements. Proceedings of the IEEE 86(7), 1480-1497 (1998)
    • (1998) Proceedings of the IEEE , vol.86 , Issue.7 , pp. 1480-1497
    • Mehrotra, A.1    Golding, L.2
  • 14
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R, Chaum, D, eds, CRYPTO 1984, Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 15
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryp-tol. 17(4), 297-319 (2004)
    • (2004) J. Cryp-tol , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 16
    • 84947242701 scopus 로고    scopus 로고
    • Toward hierarchical identity-based encryption
    • Knudsen, L.R, ed, EUROCRYPT 2002, Springer, Heidelberg
    • Horwitz, J., Lynn, B.: Toward hierarchical identity-based encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466-481. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 466-481
    • Horwitz, J.1    Lynn, B.2
  • 18
  • 19
    • 27644517087 scopus 로고    scopus 로고
    • Key Distribution Techniques for Sensor Networks
    • ISBN:1-4020-7883-8
    • Chan, H., Perrig, A., Song, D.: Key Distribution Techniques for Sensor Networks. Wireless Sensor Networks, 277-303 ISBN:1-4020-7883-8
    • Wireless Sensor Networks , pp. 277-303
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 20
    • 0038487088 scopus 로고    scopus 로고
    • Random Key Predistribution Schemes for Sensor Networks
    • May 11-14
    • Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, May 11-14, 2003, pp. 197-213 (2003)
    • (2003) IEEE Symposium on Security and Privacy , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 21
    • 8344262333 scopus 로고    scopus 로고
    • Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge. In: Proceedings of the IEEE INFOCOM 2004, March 7-11,2004, pp. 586-597 (2004)
    • Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge. In: Proceedings of the IEEE INFOCOM 2004, March 7-11,2004, pp. 586-597 (2004)
  • 25
    • 77951539120 scopus 로고    scopus 로고
    • Key distribution for heterogeneous mobile wireless networks
    • San Francisco, November 27, December 1
    • Durresi, A., Bulusu, V., Durresi, M., Paruchuri, V., Jain, R.: Key distribution for heterogeneous mobile wireless networks. In: Proceeding of Globecom 2006, San Francisco, November 27 - December 1 (2006) WSN09-4: 1-5
    • (2006) Proceeding of Globecom
    • Durresi, A.1    Bulusu, V.2    Durresi, M.3    Paruchuri, V.4    Jain, R.5
  • 26
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion detection techniques for mobile wireless networks
    • Zhang, Y., Lee, W., Huang, Y.A.: Intrusion detection techniques for mobile wireless networks. Wireless Networks 9(5), 545-556 (2003)
    • (2003) Wireless Networks , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.A.3
  • 28
    • 30144440941 scopus 로고    scopus 로고
    • Dempster-shafer theory for intrusion detection in ad hoc networks
    • Chen, T.M., Venkataramanan, V.: Dempster-shafer theory for intrusion detection in ad hoc networks. IEEE Internet Computing 9(6), 35-41 (2005)
    • (2005) IEEE Internet Computing , vol.9 , Issue.6 , pp. 35-41
    • Chen, T.M.1    Venkataramanan, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.