-
1
-
-
56749100658
-
-
Statistics Handbook of Japan 2007, Statistics Bureau of Japan, 2007.
-
"Statistics Handbook of Japan 2007", Statistics Bureau of Japan, 2007.
-
-
-
-
2
-
-
34548269952
-
-
Pervasive Healthcare and Wireless Health Monitoring, U. Varshney, Mobile Networking Applications (2007), V.12, pp. 113-127, 2007.
-
"Pervasive Healthcare and Wireless Health Monitoring", U. Varshney, Mobile Networking Applications (2007), V.12, pp. 113-127, 2007.
-
-
-
-
3
-
-
34247106132
-
-
Living Assistance Systems: - An Ambient Intelligence Approach, J. Nehmer, M. Becker, A. Karshmer, R. Lamm, ICSE'06, Shanghai, China, pp.43-50, May 20-28, 2006.
-
"Living Assistance Systems: - An Ambient Intelligence Approach", J. Nehmer, M. Becker, A. Karshmer, R. Lamm, ICSE'06, Shanghai, China, pp.43-50, May 20-28, 2006.
-
-
-
-
4
-
-
56749138396
-
-
International Conference on Aging, Disability and Independence, St. Petersburg, U.S.A., February 1-5, 2006.
-
International Conference on Aging, Disability and Independence", St. Petersburg, U.S.A., February 1-5, 2006.
-
-
-
-
5
-
-
38349178199
-
-
Security and Privacy for Implantable Medical Devices, D. Halperin, T.S. Heydt-Benjamin, K. Fu, W. H. Maisel, IEEE Pervasive Computing pp.30-39, January-March, 2008.
-
"Security and Privacy for Implantable Medical Devices", D. Halperin, T.S. Heydt-Benjamin, K. Fu, W. H. Maisel, IEEE Pervasive Computing pp.30-39, January-March, 2008.
-
-
-
-
6
-
-
56749161814
-
-
Pre-Authentication and Authentication Models in Ad Hoc Networks, K. Hoeper, G. Gong, Wireless Network Security, Part II, Springer Verlag, ISBN 978-0-387-28040-0, pp. pp. 65-82, December 2006.
-
"Pre-Authentication and Authentication Models in Ad Hoc Networks", K. Hoeper, G. Gong, Wireless Network Security, Part II, Springer Verlag, ISBN 978-0-387-28040-0, pp. pp. 65-82, December 2006.
-
-
-
-
7
-
-
4043157158
-
-
An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions, O .H. Tekbas, N. Serinken, and O. Ureten, Canadian Journal Electrical and Computer Engineering, V. 29, N. 3, July 2004.
-
"An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions", O .H. Tekbas, N. Serinken, and O. Ureten, Canadian Journal Electrical and Computer Engineering, V. 29, N. 3, July 2004.
-
-
-
-
8
-
-
34249822230
-
-
Wireless security through RF fingerprinting, O. Ureten, N. Serinken, Canadian Journal Electrical and Computer Engineering, V. 32, N. 1, Winter 2007.
-
"Wireless security through RF fingerprinting", O. Ureten, N. Serinken, Canadian Journal Electrical and Computer Engineering, V. 32, N. 1, Winter 2007.
-
-
-
-
9
-
-
33748995703
-
-
Detecting Impersonation Attacks in Future Wireless and Mobile Networks, J. Hall, M. Barbeau, E. Kranakis, Mobile Ad-hoc Networks and Sensors workshop (MADNES), Springer-Verlag LNCS, V. 4074, pp. 80-95, 2006.
-
"Detecting Impersonation Attacks in Future Wireless and Mobile Networks", J. Hall, M. Barbeau, E. Kranakis, Mobile Ad-hoc Networks and Sensors workshop (MADNES), Springer-Verlag LNCS, V. 4074, pp. 80-95, 2006.
-
-
-
-
10
-
-
0242678584
-
-
Self-Organized Public-Key Management for Mobile Ad Hoc Networks, S. Capkun, L. Buttyan, J.-P. Hubaux, IEEE Transactions On Mobile Computing, V.2, N.l, pp.52-64, Jan.-Mar., 2003.
-
"Self-Organized Public-Key Management for Mobile Ad Hoc Networks", S. Capkun, L. Buttyan, J.-P. Hubaux, IEEE Transactions On Mobile Computing, V.2, N.l, pp.52-64, Jan.-Mar., 2003.
-
-
-
-
11
-
-
51349157157
-
-
Implications of Radio Fingerprinting on the Security of Sensor Networks, K. B. Rasmussen, S. Capkun, 3rd International Conference on Security and Privacy in Communication Networks (SecureComm07), Nice, France, September 17-20, 2007.
-
"Implications of Radio Fingerprinting on the Security of Sensor Networks", K. B. Rasmussen, S. Capkun, 3rd International Conference on Security and Privacy in Communication Networks (SecureComm07), Nice, France, September 17-20, 2007.
-
-
-
-
12
-
-
33846997176
-
-
Electromagnetic Signatures of WLAN Cards and Network Security, K.A. Remley, C.A. Grosvenor, R.T. Johnk, D.R. Novotny, P.D. Hale, M.D. McKinley, A. Karygiannis, E. Antonakakis, 2005 IEEE International Symposium on Signal Processing and Information Technology, Athens, Greece, pp.484-488, December 18-20, 2005.
-
"Electromagnetic Signatures of WLAN Cards and Network Security", K.A. Remley, C.A. Grosvenor, R.T. Johnk, D.R. Novotny, P.D. Hale, M.D. McKinley, A. Karygiannis, E. Antonakakis, 2005 IEEE International Symposium on Signal Processing and Information Technology, Athens, Greece, pp.484-488, December 18-20, 2005.
-
-
-
-
13
-
-
37749047975
-
-
Robust Location Distinction using Temporal Link Signatures, N. Patwari, S.K. Kasera, MobiCom'07, Montréal, Canada, pp. 111-122, September 9-14, 2007.
-
"Robust Location Distinction using Temporal Link Signatures", N. Patwari, S.K. Kasera, MobiCom'07, Montréal, Canada, pp. 111-122, September 9-14, 2007.
-
-
-
-
14
-
-
34247324807
-
-
Detecting Identity-Based Attacks in Wireless Networks using Signalprints, D.B. Faria, D. R. Cheriton, WiSe'06, Los Angeles, USA, pp. 43-52, September 29, 2006.
-
"Detecting Identity-Based Attacks in Wireless Networks using Signalprints", D.B. Faria, D. R. Cheriton, WiSe'06, Los Angeles, USA, pp. 43-52, September 29, 2006.
-
-
-
-
15
-
-
58049188696
-
-
Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility, M. Poturalski, P. Papadimitratos, J.-P. Hubaux, Proceedings of the 2008 ACM symposium on Information, computer and communications security, Tokyo, Japan, pp. 189-200, 2008.
-
"Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possibility", M. Poturalski, P. Papadimitratos, J.-P. Hubaux, Proceedings of the 2008 ACM symposium on Information, computer and communications security, Tokyo, Japan, pp. 189-200, 2008.
-
-
-
-
16
-
-
56749100656
-
-
Key Distribution Mechanisms for Wireless Sensor Networks: a Survey, S. A. Camptepe, B. Yener, Technical Report TR-05-07, Rensselaer Polytechnic Institute, Computer Science Department, Troy, New York, U.S.A., March 23, 2005.
-
"Key Distribution Mechanisms for Wireless Sensor Networks: a Survey", S. A. Camptepe, B. Yener, Technical Report TR-05-07, Rensselaer Polytechnic Institute, Computer Science Department, Troy, New York, U.S.A., March 23, 2005.
-
-
-
-
17
-
-
34147173361
-
-
A Survey on Peer-to-Peer Key Management for Mobile Ad Hoc Networks, J. Vandermerwe, D. Dawoud, S. McDonald, ACM Computing. Surveys.V.39, N.l, Article 1, April 2007.
-
"A Survey on Peer-to-Peer Key Management for Mobile Ad Hoc Networks", J. Vandermerwe, D. Dawoud, S. McDonald, ACM Computing. Surveys.V.39, N.l, Article 1, April 2007.
-
-
-
-
18
-
-
56749095356
-
-
Protocols for Authentication and Key Establishment, C. Boyd, A. Mathuria, Springer-Verlag, Berlin, Germany, ISBN:3-540-43107-1, 2003.
-
"Protocols for Authentication and Key Establishment", C. Boyd, A. Mathuria, Springer-Verlag, Berlin, Germany, ISBN:3-540-43107-1, 2003.
-
-
-
-
19
-
-
0022045868
-
-
Impossibility of Distributed Consensus with One Faulty Process, M. J. Fischer, N. A. Lynch, M. S. Paterson, Journal of the Assccktion for Computing Machinery, V.32, N.2, pp. 374-382, April 1985.
-
"Impossibility of Distributed Consensus with One Faulty Process", M. J. Fischer, N. A. Lynch, M. S. Paterson, Journal of the Assccktion for Computing Machinery, V.32, N.2, pp. 374-382, April 1985.
-
-
-
-
20
-
-
0141854015
-
-
Hundreds of impossibility results for distributed computing, F. Fich, E. Ruppert, Distributed Computing, Springer-Verlag, V.16, pp.121-163,2003.
-
"Hundreds of impossibility results for distributed computing", F. Fich, E. Ruppert, Distributed Computing, Springer-Verlag, V.16, pp.121-163,2003.
-
-
-
-
21
-
-
84948991087
-
-
A Secure and Efficient Conference Key Distribution System, M. Burmester, Y. Desmedt, Advances in Cryptology - Eurocrypt '94, Springer-Verlag LNCS 950, pp. 275-286, 1995.
-
"A Secure and Efficient Conference Key Distribution System", M. Burmester, Y. Desmedt, Advances in Cryptology - Eurocrypt '94, Springer-Verlag LNCS 950, pp. 275-286, 1995.
-
-
-
-
22
-
-
56749134358
-
-
Authenticated Multi-Party Key Agreement, M. Just, S. Vaudenay, ASIACRYPT: Advances in Cryptology --ASIACRYPT: International Conference on the Theory and Application of Cryptology, 1996.
-
"Authenticated Multi-Party Key Agreement", M. Just, S. Vaudenay, ASIACRYPT: Advances in Cryptology --ASIACRYPT: International Conference on the Theory and Application of Cryptology, 1996.
-
-
-
-
23
-
-
56749128166
-
-
Rethinking Public Key Infrastructures and Digital Certificates, S. Brands, MIT Press, Cambridge Ma., U.S.A., ISBN:0-262-02491-8, 2001.
-
"Rethinking Public Key Infrastructures and Digital Certificates", S. Brands, MIT Press, Cambridge Ma., U.S.A., ISBN:0-262-02491-8, 2001.
-
-
-
-
24
-
-
56749109830
-
-
Resilient Aggregation in Sensor Networks, D. Wagner, SASN'04, Washington, U.S.A., pp.78-87, October 25, 2004.
-
"Resilient Aggregation in Sensor Networks", D. Wagner, SASN'04, Washington, U.S.A., pp.78-87, October 25, 2004.
-
-
-
-
25
-
-
34547471023
-
-
RANBAR: RANSACBased Resilient Aggregation in Sensor Networks, L. Buttyan, P. Schaffer, I. Vajda, SASN'06, Alexandria, U.S.A., October 30, 2006.
-
"RANBAR: RANSACBased Resilient Aggregation in Sensor Networks", L. Buttyan, P. Schaffer, I. Vajda, SASN'06, Alexandria, U.S.A., October 30, 2006.
-
-
-
-
26
-
-
0037396695
-
-
Secret-Key Agreement over Unauthenticated Public Channels Part I: Denitions and a Completeness Result, U. Maurer, S. Wolf., IEEE Transactions on Information Theory, V.49, N.4, pp.822-831,2003.
-
"Secret-Key Agreement over Unauthenticated Public Channels Part I: Denitions and a Completeness Result", U. Maurer, S. Wolf., IEEE Transactions on Information Theory, V.49, N.4, pp.822-831,2003.
-
-
-
-
27
-
-
56749161813
-
-
Telecommunications and Internet Protocol Harmonization over Networks (TIPHON) Release 04; Protocol Framework Definition; Methods and Protocols for Security; Part 1: Threat Analysis,ETSI TS 102 165-1 V4.1.1 2003-02
-
"Telecommunications and Internet Protocol Harmonization over Networks (TIPHON) Release 04; Protocol Framework Definition; Methods and Protocols for Security; Part 1: Threat Analysis",ETSI TS 102 165-1 V4.1.1 (2003-02).
-
-
-
|