-
1
-
-
51349129063
-
Sensor networks for medical care
-
V. Shnayder, B. Chen, K. Lorincz, T. Jones, and M. Welsh, "Sensor networks for medical care," in SenSys '05: Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, 2005.
-
(2005)
in SenSys '05: Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems
-
-
Shnayder, V.1
Chen, B.2
Lorincz, K.3
Jones, T.4
Welsh, M.5
-
2
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
DOI 10.1109/MPRV.2004.18
-
K. Lorincz, D. J. Malan, T. R. F. Fulford-Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, M. Welsh, and S. Moulton, "Sensor networks for emergency response: Challenges and opportunities," IEEE Pervasive Computing, vol. 3, no. 4, pp. 16-23, 2004. (Pubitemid 40010894)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 16-23
-
-
Lorincz, K.1
Malan, D.J.2
Fulford-Jones, T.R.F.3
Nawoj, A.4
Clavel, A.5
Shnayder, V.6
Mainland, G.7
Welsh, M.8
Moulton, S.9
-
3
-
-
45849120977
-
ALARM-NET: Wireless sensor networks for assisted-living and residential monitoring
-
University of Virginia, Tech. Rep. CS-2006-1
-
A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin, and J. Stankovic, "ALARM-NET: Wireless sensor networks for assisted-living and residential monitoring," Department of Computer Science, University of Virginia, Tech. Rep. CS-2006-1, 2006.
-
(2006)
Department of Computer Science
-
-
Wood, A.1
Virone, G.2
Doan, T.3
Cao, Q.4
Selavo, L.5
Wu, Y.6
Fang, L.7
He, Z.8
Lin, S.9
Stankovic, J.10
-
5
-
-
34548836079
-
Data throughput optimization in the IEEE 802.15.4 medical sensor networks
-
4252900, 2007 IEEE International Symposium on Circuits and Systems, ISCAS 2007
-
S. Stoa, I. Balasingham, and T. A. Ramstad, "Data throughput optimization in the IEEE 802.15.4 medical sensor networks." in IEEE International Symposium on Circuits and Systems, 2007, pp. 1361-1364. (Pubitemid 47448770)
-
(2007)
Proceedings - IEEE International Symposium on Circuits and Systems
, pp. 1361-1364
-
-
Stoa, S.1
Balasingham, I.2
Ramstad, T.A.3
-
6
-
-
33846932093
-
Interoperability and security in wireless body area network infrastructures
-
1615297, Proceedings of the 2005 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEE-EMBS 2005
-
S. Warren, J. Lebak, J. Yao, J. Creekmore, A. Milenkovic, and E. Jovanov, "Interoperability and security in wireless body area network infrastructures," in Proceedings of the 27th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2005, pp. 3837-3840. (Pubitemid 46229771)
-
(2005)
Annual International Conference of the IEEE Engineering in Medicine and Biology - Proceedings
, vol.7
, pp. 3837-3840
-
-
Warren, S.1
Lebak, J.2
Yao, J.3
Creekmore, J.4
Milenkovic, A.5
Jovanov, E.6
-
7
-
-
34047155030
-
Security and privacy issues with health care information technology
-
DOI 10.1109/IEMBS.2006.260060, 4029775, 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS'06
-
S. S. Marci Meingast, Tanya Roosta, "Security and privacy issues with health care information technology," in EMBS '06: Proceedings of the 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, August 2006, pp. 5453-5458. (Pubitemid 46521150)
-
(2006)
Annual International Conference of the IEEE Engineering in Medicine and Biology - Proceedings
, pp. 5453-5458
-
-
Meingast, M.1
Roosta, T.2
Sastry, S.3
-
8
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
C. Karlof, N. Sastry, and D. Wagner, "TinySec: A link layer security architecture for wireless sensor networks," in Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), November 2004, pp. 162-175.
-
(2004)
in Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), November
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
9
-
-
34547663417
-
Efficiently securing data on a wireless sensor network
-
M. Healy, T. Newe, and E. Lewis, "Efficiently securing data on a wireless sensor network," Journal of Physics: Conference Series, vol. 76, 2007.
-
(2007)
Journal of Physics: Conference Series
, vol.76
-
-
Healy, M.1
Newe, T.2
Lewis, E.3
-
10
-
-
37149040069
-
Enabling Full-Size Public- Key Algorithms on 8-bit Sensor Nodes
-
Springer-Verlag
-
L. Uhsadel, A. Poschmann, and C. Paar, "Enabling Full-Size Public- Key Algorithms on 8-bit Sensor Nodes," in Proceedings of European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2007), ser. LNCS, vol. 4572. Springer-Verlag, 2007, pp. 73-86.
-
(2007)
Proceedings of European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2007), ser. LNCS
, vol.4572
, pp. 73-86
-
-
Uhsadel, L.1
Poschmann, A.2
Paar, C.3
-
12
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
Springer
-
P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, "NanoECC: Testing the limits of elliptic curve cryptography in sensor networks," in Proceedings of the 5th European conference on Wireless Sensor Networks (EWSN), ser. Lecture Notes in Computer Science, vol. 4913. Springer, 2008, pp. 305-320.
-
(2008)
in Proceedings of the 5th European conference on Wireless Sensor Networks (EWSN), ser. Lecture Notes in Computer Science
, vol.4913
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
14
-
-
33749604819
-
Authenticated in-network programming for wireless sensor networks
-
Ad-Hoc, Mobile, and Wireless Networks - 5th International Conference, ADHOC-NOW 2006, Proceedings
-
I. Krontiris and T. Dimitriou, "Authenticated in-network programming for wireless sensor networks," in Proceedings of the 5th International Conference on AD-HOC Networks & Wireless (ADHOC-NOW '06), 2006, pp. 390-403. (Pubitemid 44543222)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4104
, pp. 390-403
-
-
Krontiris, I.1
Dimitriou, T.2
-
15
-
-
84939435969
-
BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
S. Cherukuri, K. K. Venkatasubramanian, and S. K. S. Gupta, "BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body," in Proceedings of the Workshop on Wireless Security and Privacy (WiSPr), International Conference on Parallel Processing Workshops, 2003, pp. 432-439.
-
(2003)
in Proceedings of the Workshop on Wireless Security and Privacy (WiSPr), International Conference on Parallel Processing Workshops
, pp. 432-439
-
-
Cherukuri, S.1
Venkatasubramanian, K.K.2
Gupta, S.K.S.3
-
16
-
-
43949140900
-
Biometric methods for secure communications in body sensor networks: Resource-efficient key management and signal-level data scrambling
-
F. M. Bui and D. Hatzinakos, "Biometric methods for secure communications in body sensor networks: resource-efficient key management and signal-level data scrambling," EURASIP J. Adv. Signal Process, vol. 8, no. 2, pp. 1-16, 2008.
-
(2008)
EURASIP J. Adv. Signal Process
, vol.8
, Issue.2
, pp. 1-16
-
-
Bui, F.M.1
Hatzinakos, D.2
-
17
-
-
33745931868
-
Time synchronization attacks in sensor networks
-
M. Manzo, T. Roosta, and S. Sastry, "Time synchronization attacks in sensor networks," in SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, 2005, pp. 107-116.
-
(2005)
in SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
, pp. 107-116
-
-
Manzo, M.1
Roosta, T.2
Sastry, S.3
-
18
-
-
38549129893
-
Providing transparent security services to sensor networks
-
Glasgow, Scotland, June
-
H. Soroush, M. Salajegheh, and T. Dimitriou, "Providing transparent security services to sensor networks," in ICC'07: Proceedings of the IEEE International Conference on Communications, Glasgow, Scotland, June 2007.
-
(2007)
in ICC'07: Proceedings of the IEEE International Conference on Communications
-
-
Soroush, H.1
Salajegheh, M.2
Dimitriou, T.3
-
19
-
-
67650212193
-
Wireless Sensors Networks Security. IOS Press
-
I. Krontiris, T. Dimitriou, H. Soroush, and M. Salajegheh, Wireless Sensors Networks Security. IOS Press, 2008, ch. WSN Link-layer Security Frameworks, pp. 142-163.
-
(2008)
Ch. WSN Link-layer Security Frameworks
, pp. 142-163
-
-
Krontiris, I.1
Dimitriou, T.2
Soroush, H.3
Salajegheh, M.4
-
21
-
-
33745853759
-
Security issues of wireless sensor networks in healthcare applications
-
DOI 10.1007/s10550-006-0051-8
-
H. S. Ng, M. L. Sim, and C. M. Tan, "Security issues of wireless sensor networks in healthcare applications," BT Technology Journal, vol. 24, no. 2, pp. 138-144, 2006. (Pubitemid 44027470)
-
(2006)
BT Technology Journal
, vol.24
, Issue.2
, pp. 138-144
-
-
Ng, H.S.1
Sim, M.L.2
Tan, C.M.3
|