-
1
-
-
18244373181
-
A Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation
-
Mar
-
E. Jovanov et al., "A Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation," J. Neuro Eng. Rehab., vol. 2, no. 6, Mar. 2005.
-
(2005)
J. Neuro Eng. Rehab
, vol.2
, Issue.6
-
-
Jovanov, E.1
-
2
-
-
38349178199
-
Security and Privacy for Implantable Medical Devices
-
Jan
-
D. Halperin et al., "Security and Privacy for Implantable Medical Devices," IEEE Pervasive Comp., vol. 7, no. 1, Jan. 2008, pp. 30-39.
-
(2008)
IEEE Pervasive Comp
, vol.7
, Issue.1
, pp. 30-39
-
-
Halperin, D.1
-
3
-
-
10944253573
-
Sensor Networks for Emergency Response: Challenges and Opportunities
-
Oct.-Dec
-
K. Lorincz et al., "Sensor Networks for Emergency Response: Challenges and Opportunities," IEEE Pervasive Comp., vol. 3, no. 4, Oct.-Dec. 2004, pp. 16-23.
-
(2004)
IEEE Pervasive Comp
, vol.3
, Issue.4
, pp. 16-23
-
-
Lorincz, K.1
-
4
-
-
77649092026
-
-
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule; http://www.hhs.gov/ocr/privacy/
-
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy Rule; http://www.hhs.gov/ocr/privacy/
-
-
-
-
5
-
-
1542300188
-
Dependable and Secure Data Storage and Retrieval in Mobile, Wireless Networks
-
June
-
S. Chessa and P. Maestrini, "Dependable and Secure Data Storage and Retrieval in Mobile, Wireless Networks," Int'l. Conf. Dependable Sys. Net., June 2003, pp. 207-16.
-
(2003)
Int'l. Conf. Dependable Sys. Net
, pp. 207-216
-
-
Chessa, S.1
Maestrini, P.2
-
6
-
-
70349659577
-
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
-
Apr
-
Q. Wang et al., "Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance," Proc. IEEE INFOCOM '09, Apr. 2009.
-
(2009)
Proc. IEEE INFOCOM '09
-
-
Wang, Q.1
-
7
-
-
49149089237
-
Catch Me (If You Can): Data Survival in Unattended Sensor Networks
-
Mar
-
R. Di Pietro et al., "Catch Me (If You Can): Data Survival in Unattended Sensor Networks," Proc. IEEE PerCom, Mar. 2008, pp. 185-94.
-
(2008)
Proc. IEEE PerCom
, pp. 185-194
-
-
Di Pietro, R.1
-
8
-
-
85015580987
-
Security Solutions for Pervasive Healthcare
-
Y. Xiao, Ed, Auerbach
-
K. K. Venkatasubramanian and S. K. S. Gupta, "Security Solutions for Pervasive Healthcare," in Security in Distributed, Grid, Mobile, and Pervasive Computing, Y. Xiao, Ed., Auerbach, 2007, pp. 443-64.
-
(2007)
Security in Distributed, Grid, Mobile, and Pervasive Computing
, pp. 443-464
-
-
Venkatasubramanian, K.K.1
Gupta, S.K.S.2
-
9
-
-
63149087345
-
Efficient Distributed Security for Wireless Medical Sensor Networks
-
Dec
-
O. G. Morchon and H. Baldus, "Efficient Distributed Security for Wireless Medical Sensor Networks," Int'l. Conf. Intelligent Sensors, Sensor Net., Info. Processing, Dec. 2008, pp. 249-54.
-
(2008)
Int'l. Conf. Intelligent Sensors, Sensor Net., Info. Processing
, pp. 249-254
-
-
Morchon, O.G.1
Baldus, H.2
-
11
-
-
77649141255
-
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
-
Sept
-
S. Yu et al., "Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems," SecureComm 2009, Sept. 2009.
-
(2009)
SecureComm 2009
-
-
Yu, S.1
-
12
-
-
70349682512
-
FDAC: Toward Finegrained Distributed Data Access Control in Wireless Sensor Networks
-
Apr
-
S. Yu, K. Ren, and W. Lou, "FDAC: Toward Finegrained Distributed Data Access Control in Wireless Sensor Networks," IEEE INFOCOM '09, Apr. 2009.
-
(2009)
IEEE INFOCOM '09
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
13
-
-
84934300668
-
Computing Cryptographic Algorithms in Portable and Embedded Devices
-
May
-
A. Ramachandran, Z. Zhou, and D. Huang, "Computing Cryptographic Algorithms in Portable and Embedded Devices," IEEE PORTABLE '07, May 2007, pp. 1-7.
-
(2007)
IEEE PORTABLE '07
, pp. 1-7
-
-
Ramachandran, A.1
Zhou, Z.2
Huang, D.3
-
14
-
-
45749094622
-
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
-
May
-
T. Nishide, K. Yoneyama and K. Ohta, "Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures," Proc. LNCS Applied Cryptography Net. Security, May 2008, pp. 111-29.
-
(2008)
Proc. LNCS Applied Cryptography Net. Security
, pp. 111-129
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
15
-
-
70349658629
-
DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks
-
Apr
-
R. Zhang, Y. Zhang, and K. Ren, "DP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks," Proc. IEEE INFOCOM '09, Apr. 2009.
-
(2009)
Proc. IEEE INFOCOM '09
-
-
Zhang, R.1
Zhang, Y.2
Ren, K.3
|