-
1
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
Oct/Dec
-
K. Lorincz, D. Malan, T. F. Jones, A. Nawoj, A. Clavel, V. Shnayder, G. Mainland, S. Moulton, M. Welsh, Sensor Networks for Emergency Response: Challenges and Opportunities, IEEE Pervasive Computing, Oct/Dec, 2004, pp. 16-23.
-
(2004)
IEEE Pervasive Computing
, pp. 16-23
-
-
Lorincz, K.1
Malan, D.2
Jones, T.F.3
Nawoj, A.4
Clavel, A.5
Shnayder, V.6
Mainland, G.7
Moulton, S.8
Welsh, M.9
-
2
-
-
79953033487
-
-
http://fiji.eecs.harvard.edu/CodeBlue
-
-
-
-
3
-
-
79953066890
-
-
Joint Workshop on High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability, June, Boston, MA
-
R. Jafari, R. Bajcsy, S. Glaser, B. Gnade, M. Sgroi, S. Sastry. Platform Design for Health-care Monitoring Applications, Joint Workshop on High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability, June 2007, Boston, MA.
-
(2007)
Platform Design for Health-care Monitoring Applications
-
-
Jafari, R.1
Bajcsy, R.2
Glaser, S.3
Gnade, B.4
Sgroi, M.5
Sastry, S.6
-
4
-
-
79953039702
-
-
http://bsn.citris.berkeley.edu/home/
-
-
-
-
5
-
-
79953030990
-
-
http://web.mit.edu/wockets/
-
-
-
-
6
-
-
79953041470
-
-
http://smart.csail.mit.edu/
-
-
-
-
7
-
-
79953049764
-
-
http://www.mobihealth.org/
-
-
-
-
8
-
-
79953042293
-
-
http://www.doc.ic.ac.uk/vip/ubimon/home/index.html
-
-
-
-
9
-
-
34247399967
-
Sensor networks, wearable computing, and healthcare applications
-
April-June
-
Trossen, D.; Pavel, D.; Sensor Networks, Wearable Computing, and Healthcare Applications. IEEE Pervasive Computing. Vol. 6(2), April-June 2007, pp. 58-61.
-
(2007)
IEEE Pervasive Computing
, vol.6
, Issue.2
, pp. 58-61
-
-
Trossen, D.1
Pavel, D.2
-
10
-
-
74549125519
-
An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography
-
Special Issues on Secure Wireless Networking, December 2009 (in press)
-
X. H. Le, S. Lee, I. Butun, M. Khalid, R. Sankar, M. Kim, M-H. Han, Y-K. Lee, H. Lee. An Energy-Efficient Access Control Scheme for Wireless Sensor Networks based on Elliptic Curve Cryptography. Journal of Communications and Networks, Special Issues on Secure Wireless Networking, December 2009 (in press).
-
Journal of Communications and Networks
-
-
Le, X.H.1
Lee, S.2
Butun, I.3
Khalid, M.4
Sankar, R.5
Kim, M.6
Han, M.-H.7
Lee, Y.-K.8
Lee, H.9
-
11
-
-
84863265355
-
Public key cryptography - based security scheme for wireless sensor networks in healthcare
-
Suwon, Korea, January, (in press)
-
X. H. Le, R. Sankar, M. Khalid, and S. Lee, Public Key Cryptography - based Security Scheme for Wireless Sensor Networks in Healthcare, 4th International Conference on Ubiquitous Information Management and Communication (ICUIMC), Suwon, Korea, January 2010 (in press).
-
(2010)
4th International Conference on Ubiquitous Information Management and Communication (ICUIMC)
-
-
Le, X.H.1
Sankar, R.2
Khalid, M.3
Lee, S.4
-
12
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
March
-
M. Das, Two-Factor User Authentication in Wireless Sensor Networks, IEEE Transactions on Wireless Communications, Vol. 8(3), March 2009, pp. 1086-1090.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.1
-
13
-
-
77952326880
-
Improved robust user authentication scheme for wireless sensor networks
-
Allahabad, India
-
B. Vaidya, M. Chen, J.J.P.C. Rodrigues, Improved Robust User Authentication Scheme for Wireless Sensor Networks, Fifth IEEE Conference on Wireless Communication and Sensor Networks (WCSN), Allahabad, India, 2009, pp. 1-6.
-
(2009)
Fifth IEEE Conference on Wireless Communication and Sensor Networks (WCSN)
, pp. 1-6
-
-
Vaidya, B.1
Chen, M.2
Rodrigues, J.J.P.C.3
-
14
-
-
49949083706
-
Elliptic curve cryptographybased access control in sensor networks
-
H. Wang, B. Sheng, Q. Li, Elliptic curve cryptographybased access control in sensor networks, Int. J. Security and Networks, Vol. 1, Nos. 3/4, pp.127-137 (2006).
-
(2006)
Int. J. Security and Networks
, vol.1
, Issue.3-4
, pp. 127-137
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
15
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-it CPUs
-
LNCS
-
N. Gura, A. Patel, A. Wander, H. Eberle, S. C. Shantz, Comparing Elliptic Curve Cryptography and RSA on 8-it CPUs. In CHES 2004, Vol. 3156, LNCS, pp.119-132.
-
(2004)
CHES
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
16
-
-
32844459414
-
Key predistribution scheme for sensor networks using deployment knowledge
-
W. Du, J. Deng, Y. Han, P. Varshney, Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Trans. Depend. Secure 2006, 3, 62-77.
-
(2006)
IEEE Trans. Depend. Secure
, vol.3
, pp. 62-77
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
17
-
-
77952655038
-
A Secure coordination - based data dissemination for mobile sinks in sensor networks
-
X. H. Le, S. Lee, Y-K. Lee, H. Lee. A Secure Coordination - based Data Dissemination for Mobile sinks in Sensor Networks. IEICE Transaction on Communication, 2009, Vol E92-B(01).
-
(2009)
IEICE Transaction on Communication
, vol.E92-B
, Issue.1
-
-
Le, X.H.1
Lee, S.2
Lee, Y.-K.3
Lee, H.4
-
18
-
-
58149190051
-
An energy-efficient secure routing and key management scheme for mobile sinks in wireless sensor networks using deploying knowledge
-
X. H. Le, N. Canh, S. Lee, Y-K. Lee, H. Lee. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks using Deploying Knowledge. Journal of Sensor, Special Issue ''Wireless Sensor Technologies and Applications'', 2008, Vol.8(12) pp. 7753-7782.
-
(2008)
Journal of Sensor, Special Issue ''Wireless Sensor Technologies and Applications''
, vol.8
, Issue.12
, pp. 7753-7782
-
-
Le, X.H.1
Canh, N.2
Lee, S.3
Lee, Y.-K.4
Lee, H.5
-
19
-
-
33745853759
-
Security issues of wireless sensor networks in healthcare applications
-
H. S. Ng, M. L. Sim, C. M. Tan. Security issues of wireless sensor networks in healthcare applications. BT Tech. Journal, Vol. 24 No 2, 2006, pp. 138-144.
-
(2006)
BT Tech. Journal
, vol.24
, Issue.2
, pp. 138-144
-
-
Ng, H.S.1
Sim, M.L.2
Tan, C.M.3
-
20
-
-
67349129674
-
A secure mobile healthcare system using trust-based multicast scheme
-
A. Boukerche and R. Yonglin, A secure mobile healthcare system using trust-based multicast scheme. IEEE J. Selected Areas Comm., vol 27(4), 2009 pp:387-399.
-
(2009)
IEEE J. Selected Areas Comm
, vol.27
, Issue.4
, pp. 387-399
-
-
Boukerche, A.1
Yonglin, R.2
-
22
-
-
38049136820
-
Towards a Security Policy for Ubiquitous Healthcare Systems
-
J. Kim, A. R. Beresford, and F. Stajano, Towards a Security Policy for Ubiquitous Healthcare Systems, Proc. 1st International Conference on Ubiquitous Convergence Technology, pp. 263-272, 2006.
-
(2006)
Proc. 1st International Conference on Ubiquitous Convergence Technology
, pp. 263-272
-
-
Kim, J.1
Beresford, A.R.2
Stajano, F.3
-
23
-
-
33846925115
-
Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems
-
S.-D. Bao, Y.-T. Zhang, and L.-F. Shen, Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems, Proc. 27th Annual International Conference of Engineering in Medicine and Biology Society, pp. 2455-2458, 2005.
-
(2005)
Proc. 27th Annual International Conference of Engineering in Medicine and Biology Society
, pp. 2455-2458
-
-
Bao, S.-D.1
Zhang, Y.-T.2
Shen, L.-F.3
-
25
-
-
79953060157
-
Secure mobile health systems: Principles and solutions, M-Health: Emerging Mobile Health Systems
-
Kluwer Academic Publishers
-
M. Markovic, Z. Savic, and B. Kovacevic, Secure mobile health systems: principles and solutions, M-Health: Emerging Mobile Health Systems, Kluwer Academic Publishers, pp. 81-106, 2007.
-
(2007)
, pp. 81-106
-
-
Markovic, M.1
Savic, Z.2
Kovacevic, B.3
-
26
-
-
35048846150
-
Network and application security in mobile e-health applications
-
R. Marti, J. Delgado, and X. Perramon, Network and Application Security in Mobile e-Health Applications, Proc. International Conference on Networking Technologies for Broadband and Mobile Networks, pp.995-1004, 2004
-
(2004)
Proc. International Conference on Networking Technologies for Broadband and Mobile Networks
, pp. 995-1004
-
-
Marti, R.1
Delgado, J.2
Perramon, X.3
-
27
-
-
67349219359
-
Pervasive, secure access to a hierarchical sensorbased healthcare monitoring architecture in wireless heterogeneous networks
-
May
-
Y. M. Huang, M. Y. Hsieh, H.C. Chao, S. H. Hung, J. H. Park, Pervasive, secure access to a hierarchical sensorbased healthcare monitoring architecture in wireless heterogeneous networks. IEEE Journal on Selected Areas in Communications, Vol. 27, No 4, May 2009.
-
(2009)
IEEE Journal on Selected Areas in Communications
, vol.27
, Issue.4
-
-
Huang, Y.M.1
Hsieh, M.Y.2
Chao, H.C.3
Hung, S.H.4
Park, J.H.5
-
28
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
Baltimore, Maryland
-
C. Karlof, N. Sastry, D. Dagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys04), Baltimore, Maryland, November 2004; pp. 162-175.
-
(2004)
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys04)
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Dagner, D.3
-
29
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, S. Jajodia, LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. ACM Trans. Sens. Netw. 2006, 2, 500-528.
-
(2006)
ACM Trans. Sens. Netw
, vol.2
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
31
-
-
79953062898
-
On the security of 1024-bit RSA and 160-bit elliptic curve cryptography cryptology
-
W. Joppe, M. Kaihara, T. Kleinjung, A. K. Lenstra, and P. Montgomery, On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography Cryptology, Report on Cryptology ePrint Archive, Vol. 389, 2009.
-
(2009)
Report on Cryptology ePrint Archive
, vol.389
-
-
Joppe, W.1
Kaihara, M.2
Kleinjung, T.3
Lenstra, A.K.4
Montgomery, P.5
-
32
-
-
16344367693
-
Use of elliptic curves in cryptography
-
CRYPTO
-
V. Miller, Use of elliptic curves in cryptography, CRYPTO 85, 1985.
-
(1985)
, pp. 85
-
-
Miller, V.1
-
33
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, Elliptic curve cryptosystems, in Mathematics of Computation 48, 1987, pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
36
-
-
58149195128
-
-
Springer, NY
-
G. Chen, J. Branch, M. J. Pflug, L. Zhu, B. Szymanski, SENSE: A Sensor Network Simulator, Advances in Pervasive Computing and Networking; Springer, NY, 2004; pp. 249-269.
-
(2004)
SENSE: A Sensor Network Simulator, Advances in Pervasive Computing and Networking
, pp. 249-269
-
-
Chen, G.1
Branch, J.2
Pflug, M.J.3
Zhu, L.4
Szymanski, B.5
-
37
-
-
79953058200
-
-
NS-2
-
NS-2, http://www.isi.edu/nsnam/ns
-
-
-
-
39
-
-
79953037783
-
-
Note
-
Wireless Measurement System, MICA2'', Crossbow Technology, Inc.41 Daggett Dr. San Jose, CA 95134
-
-
-
|