-
2
-
-
0034229951
-
Picoradio supports ad-hoc ultra-low power wireless networking
-
July
-
J. Rabaey, M. Ammer, J. Silva, D. Patel and S. Roundy, "Picoradio Supports Ad-Hoc Ultra-Low Power Wireless Networking," IEEE Computers, pp. 42-48, July 2000.
-
(2000)
IEEE Computers
, pp. 42-48
-
-
Rabaey, J.1
Ammer, M.2
Silva, J.3
Patel, D.4
Roundy, S.5
-
3
-
-
45149122763
-
-
July
-
American Heart Association, http://www.americanheart.org/presenter.jhtml? identifier=4591, July 2007.
-
(2007)
American Heart Association
-
-
-
6
-
-
77958584144
-
-
Questex U.S. Technology Group
-
Questex U.S. Technology Group, http://www.sensorsmag.com, 2007.
-
(2007)
-
-
-
8
-
-
77958612844
-
-
B. Lo, S. Thiemjarus, R. King and G. Yang, "Body Sensor Network: A Wireless Sensor Platform for Pervasive Healthcare Monitoring," http://www.nextwaveinterface.org.uk/centers/UbiCare/, 2007. 331.
-
(2007)
Body Sensor Network: A Wireless Sensor Platform for Pervasive Healthcare Monitoring
, pp. 331
-
-
Lo, B.1
Thiemjarus, S.2
King, R.3
Yang, G.4
-
9
-
-
33645991463
-
Sensor networks for medical care
-
Harvard University
-
V. Shnayder, B. Chen, K. Lorincz, T. FulfordJones and M. Welsh, "Sensor Networks for Medical Care," Technical Report TR-08-05, Division of Engineering and Applied Sciences, Harvard University, 2005.
-
(2005)
Technical Report TR-08-05, Division of Engineering and Applied Sciences
-
-
Shnayder, V.1
Chen, B.2
Lorincz, K.3
FulfordJones, T.4
Welsh, M.5
-
12
-
-
77958609646
-
IHE IT infrastructure technical framework: Cross-enterprise user authentication (XUA) integration profile
-
Integrating the Healthcare Enterprise (IHE), "IHE IT Infrastructure Technical Framework: Cross-Enterprise User Authentication (XUA) Integration Profile," White paper, 2006.
-
(2006)
White paper, Integrating the Healthcare Enterprise (IHE)
-
-
-
13
-
-
77958578831
-
Healthcare and life sciences: Deployment guide - Setting up an xds affinity domain using ihii components
-
June
-
Karen Witting, "Healthcare and Life Sciences: Deployment Guide - Setting up an XDS Affinity Domain using IHII Components," IBM Healthcare and Life Science, June, 2006.
-
(2006)
IBM Healthcare and Life Science
-
-
Witting, K.1
-
14
-
-
33645997737
-
Quality of privacy (qop) for the design of ubiquitous healthcare applications
-
Monica Tentori, et al.., "Quality of Privacy (QoP) for the Design of Ubiquitous Healthcare Applications," Journal of Universal Computer Science, Vol. 12, No. 3, pp.252-269, 2006.
-
(2006)
Journal of Universal Computer Science
, vol.12
, Issue.3
, pp. 252-269
-
-
Tentori, M.1
-
16
-
-
77958548244
-
Survey on location privacy in pervasive computing (in: Privacy, security and trust within the context of pervasive computing)
-
Andreas Görlach, Wesley W. Terpstra, Andreas Heinemann, "Survey on Location Privacy in Pervasive Computing (in: Privacy, Security and Trust within the Context of Pervasive Computing)," Proceedings on Euro mGov 2005, 2005.
-
(2005)
Proceedings on Euro MGov 2005
-
-
Görlach, A.1
Terpstra, W.W.2
Heinemann, A.3
-
17
-
-
77958564609
-
A privacy preference model for pervasive computing
-
Karim Adam, et al.., "A Privacy Preference Model for Pervasive Computing," Proceedings on Euro mGov 2005, 2005.
-
(2005)
Proceedings on Euro MGov 2005
-
-
Adam, K.1
-
20
-
-
2942524994
-
Location privacy in pervasive computing
-
Jan.-Mar.
-
Alastair R. Beresford and Frank Stajano, "Location Privacy in Pervasive Computing," Pervasive Computing, pp.46-55, Jan.- Mar., 2003.
-
(2003)
Pervasive Computing
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
21
-
-
33845574135
-
Privacy-aware autonomous agents for pervasive healthcare
-
Nov.-Dec.
-
Monica Tentori, et al.., "Privacy-Aware Autonomous Agents for Pervasive Healthcare," IEEE Intelligent Systems, pp.55-62, Nov.-Dec., 2006.
-
(2006)
IEEE Intelligent Systems
, pp. 55-62
-
-
Tentori, M.1
-
22
-
-
34548155020
-
Security in pervasive computing: Current status and open issues
-
Nov.
-
Munirul Haque and Sheikh Iqbal Ahamed, "Security in Pervasive Computing: Current Status and Open Issues," International Journal of Network Security, Vol.3, No.3, pp.203- 214, Nov. 2006.
-
(2006)
International Journal of Network Security
, vol.3
, Issue.3
, pp. 203-214
-
-
Haque, M.1
Ahamed, S.I.2
-
25
-
-
33745337590
-
Defining obtrusiveness in home telehealth technologies: A conceptual framework
-
Jul-Aug
-
Brian K. Hensel, et al.., "Defining Obtrusiveness in Home Telehealth Technologies: A Conceptual Framework," Journal of American Medical Informatics Association, Vol.13, No.4, pp.428-431, Jul-Aug, 2006.
-
(2006)
Journal of American Medical Informatics Association
, vol.13
, Issue.4
, pp. 428-431
-
-
Hensel, B.K.1
-
26
-
-
77958586933
-
The five styles of sensory applications
-
G00138302, Mar.
-
Jeff Woods, "The Five Styles of Sensory Applications," Gartner Research, G00138302, Mar., 2006.
-
(2006)
Gartner Research
-
-
Woods, J.1
-
28
-
-
67650358682
-
Extension of authentication and key agreement protocol (aka) for universial mobile telecommunication system (umts)
-
Ja'afer AL-Saraireh and Sufian Yousef, "Extension of Authentication and Key Agreement Protocol (AKA) for Universial Mobile Telecommunication System (UMTS)," International Journal of Theoretical and Applied Computer Sciences, Vol.1, No.1, pp.109-118, 2006.
-
(2006)
International Journal of Theoretical and Applied Computer Sciences
, vol.1
, Issue.1
, pp. 109-118
-
-
Al-Saraireh, J.1
Yousef, S.2
-
31
-
-
44349195741
-
-
SpringerVerlag, ISBN 0387234616, (book)
-
Philip Robinson, Harald Vogt, Waleed Wagealla, "Privacy, Security, and Trust Within the Context of Pervasive Computing," SpringerVerlag, ISBN 0387234616, 2005. (book).
-
(2005)
Privacy, Security, and Trust Within the Context of Pervasive Computing
-
-
Robinson, P.1
Vogt, H.2
Wagealla, W.3
-
32
-
-
56149089819
-
Virtual sensors for service oriented environments
-
April
-
Raja Bose, Abdelsalam (Sumi) Helal, Shinyoung Lim and Vishak S Sivakumar, "Virtual Sensors for Service Oriented Environments", The 3rd IASTED International conference on Advances in Computer Science and Technology (ACST) 2007, April, 2007.
-
(2007)
3rd IASTED International Conference on Advances in Computer Science and Technology (ACST) 2007
-
-
Bose, R.1
Helal, A.2
Lim, S.3
Sivakumar, V.S.4
-
33
-
-
70350734248
-
Modeling multiple agent based cryptographic key recovery protocol
-
Shinyoung Lim, Sangseung Kang, Joochan Sohn, "Modeling Multiple Agent based Cryptographic Key Recovery Protocol", IEEE 19th 2003 ACSAC (Annual Computer Security Applications Conference), pp.119 ~ pp.128, 2003.
-
(2003)
IEEE 19th 2003 ACSAC (Annual Computer Security Applications Conference)
, pp. 119-128
-
-
Lim, S.1
Kang, S.2
Sohn, J.3
-
35
-
-
77958549799
-
Secure communication protocol for user authentication of java card
-
Shinyoung Lim, Sangseng Kang, Joochan Sohn, "Secure Communication Protocol for User Authentication of Java Card", 5th ICACT 2003 (The 5th International Conference on Advanced Communication Technology), pp.201 - pp.204, 2003.
-
(2003)
5th ICACT 2003 (The 5th International Conference on Advanced Communication Technology)
, pp. 201-204
-
-
Lim, S.1
Kang, S.2
Sohn, J.3
-
36
-
-
0035451783
-
Specification and analysis of n-way key recovery system by extended cryptographic timed petri net
-
Sep
-
Shinyoung Lim, Khjong Ho, Juneun Ah, Kangsoo Lee, Specification and Analysis of n-way Key Recovery System by Extended Cryptographic Timed Petri Net, The Journal of Systems and Software, Vol. 58, No. 2, pp.93 - pp.106, Sep 2001.
-
(2001)
The Journal of Systems and Software
, vol.58
, Issue.2
, pp. 93-106
-
-
Lim, S.1
Ho, K.2
Ah, J.3
Lee, K.4
-
39
-
-
33750699594
-
HIGHT: A new block cipher suitable for low-resource device
-
LNCS 4249
-
Deuko Hong, et al, "HIGHT: A New Block Cipher Suitable for Low-Resource Device," CHES'06, LNCS 4249, 2006.
-
(2006)
CHES'06
-
-
Hong, D.1
|