메뉴 건너뛰기




Volumn 10, Issue 4, 2011, Pages 202-236

Wireless telemedicine and m-health: Technologies, applications and research issues

Author keywords

3G 4G; E health; M health; Radio frequency identification; RFID; Telemedicine; Wireless; Wireless local area network; Wireless personal area network; WLAN; WPAN

Indexed keywords

MHEALTH; PERSONAL COMMUNICATION SYSTEMS; RADIO FREQUENCY IDENTIFICATION (RFID); WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 80053577189     PISSN: 17481279     EISSN: 17481287     Source Type: Journal    
DOI: 10.1504/IJSNET.2011.042770     Document Type: Article
Times cited : (43)

References (211)
  • 1
    • 80053616826 scopus 로고    scopus 로고
    • 10BLADE, accessed on 13 October 2010
    • 10BLADE (2004) iRevive Feature List. Available online at: http://www.10blade.com/irevive.html (accessed on 13 October 2010).
    • (2004) IRevive Feature List
  • 7
    • 39349109602 scopus 로고    scopus 로고
    • Design and analysis of a multipacket signature detection system
    • Artan, N. and Chao, H. (2007) 'Design and analysis of a multipacket signature detection system', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.122-136.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 122-136
    • Artan, N.1    Chao, H.2
  • 9
    • 77949765113 scopus 로고    scopus 로고
    • Radio frequency identification: A case study of healthcare organisations
    • Azevedo, S.G. and Ferreira, J.J. (2010) 'Radio frequency identification: a case study of healthcare organisations', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.147-155.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 147-155
    • Azevedo, S.G.1    Ferreira, J.J.2
  • 10
    • 36349035993 scopus 로고    scopus 로고
    • accessed on 13 October 2010
    • Baard, M. (2004) RFID Keeps Track of Seniors. Available online at: http://www.wired.com/medtech/health/news/2004/03/62723 (accessed on 13 October 2010).
    • (2004) RFID Keeps Track of Seniors
    • Baard, M.1
  • 11
    • 39049112972 scopus 로고    scopus 로고
    • Energy efficient thermal aware routing algorithms for embedded biomedical sensor networks
    • October, Vancouver, Canada
    • Bag, A. and Bassiouni, M.A. (2006, October) 'Energy efficient thermal aware routing algorithms for embedded biomedical sensor networks', 2006 IEEE International Conference on Mobile Adhoc and Sensor Systems, Vancouver, Canada, pp.604-609.
    • (2006) 2006 IEEE International Conference on Mobile Adhoc and Sensor Systems , pp. 604-609
    • Bag, A.1    Bassiouni, M.A.2
  • 12
    • 70349969846 scopus 로고    scopus 로고
    • A proactive secret sharing scheme in matrix projection method
    • Bai, L. and Zou, X. (2009) 'A proactive secret sharing scheme in matrix projection method', International Journal of Security and Networks, Vol. 4, No. 4, pp.201-209.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 201-209
    • Bai, L.1    Zou, X.2
  • 19
    • 61849085156 scopus 로고    scopus 로고
    • An evaluation of connection characteristics for separating network attacks
    • Berthier, R. and Cukier, M. (2009) 'An evaluation of connection characteristics for separating network attacks', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.110-124.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 110-124
    • Berthier, R.1    Cukier, M.2
  • 20
  • 21
    • 57849124555 scopus 로고    scopus 로고
    • Aggregate designated verifier signatures and application to secure routing
    • Bhaskar, R., Herranz, J. and Laguillaumie, F. (2007) 'Aggregate designated verifier signatures and application to secure routing', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.192-201.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 192-201
    • Bhaskar, R.1    Herranz, J.2    Laguillaumie, F.3
  • 22
    • 0141834008 scopus 로고    scopus 로고
    • Wearable Sensors/Systems and Their Impact on Biomedical Engineering
    • DOI 10.1109/MEMB.2003.1213622
    • Bonato, P. (2003, May/June) 'Wearable sensors/systems and their impact on biomedical engineering', IEEE Engineering in Medicine and Biology Magazine, Vol. 22, No. 2, pp.18-20. (Pubitemid 37328160)
    • (2003) IEEE Engineering in Medicine and Biology Magazine , vol.22 , Issue.3 , pp. 18-20
    • Bonato, P.1
  • 25
    • 80053605338 scopus 로고    scopus 로고
    • accessed on 13 October 2010
    • Brown, L. (1996) Modern Private Key Ciphers (part 1). Available online at: http://williamstallings.com/Extras/Security-Notes/lectures/blockA.html (accessed on 13 October 2010).
    • (1996) Modern Private Key Ciphers (Part 1)
    • Brown, L.1
  • 29
    • 0031879120 scopus 로고    scopus 로고
    • Quantification of physical activities by means of ambulatory accelerometry: A validation study
    • DOI 10.1017/S0048577298971153
    • Bussmann, J., Tulen, J., van Herel, E. and Stam, H. (1998) 'Quantification of physical activities by means of ambulatory accelerometry: a validation study', Psychophysiology, Vol. 35, No. 5, pp.488-496. (Pubitemid 28376056)
    • (1998) Psychophysiology , vol.35 , Issue.5 , pp. 488-496
    • Bussmann, J.B.J.1    Tulen, J.H.M.2    Van Herel, E.C.G.3    Stam, H.J.4
  • 31
    • 77953145198 scopus 로고    scopus 로고
    • Adaptive clustering for scalable key management in dynamic group communications
    • DOI 10.1504/IJSN.2008.017226
    • Challal, Y., Gharout, S., Bouabdallah, A. and Bettahar, H. (2008) 'Adaptive clustering for scalable key management in dynamic group communications', International Journal of Security and Networks, Vol. 3, No. 2, pp.133-146. (Pubitemid 351292182)
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 133-146
    • Challal, Y.1    Gharout, S.2    Bouabdallah, A.3    Bettahar, H.4
  • 34
    • 68149168162 scopus 로고    scopus 로고
    • Deriving a closed-form expression for worm-scanning strategies
    • Chen, Z., Chen, C. and Li, Y. (2009) 'Deriving a closed-form expression for worm-scanning strategies', International Journal of Security and Networks, Vol. 4, No. 3, pp.135-144.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 135-144
    • Chen, Z.1    Chen, C.2    Li, Y.3
  • 36
    • 34548366188 scopus 로고    scopus 로고
    • Optimal worm-scanning method using vulnerable-host distributions
    • Chen, Z. and Ji, C. (2007) 'Optimal worm-scanning method using vulnerable-host distributions', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.71-80.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 71-80
    • Chen, Z.1    Ji, C.2
  • 37
    • 38049042723 scopus 로고    scopus 로고
    • On security proof of McCullagh-Barreto's key agreement protocol and its variants
    • Cheng, Z. and Chen, L. (2007) 'On security proof of McCullagh-Barreto's key agreement protocol and its variants', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.251-259.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 251-259
    • Cheng, Z.1    Chen, L.2
  • 40
    • 0347423198 scopus 로고    scopus 로고
    • Seventh report of the Joint National Committee on Prevention, Detection, Evaluation, and Treatment of High Blood Pressure
    • DOI 10.1161/01.HYP.0000107251.49515.c2
    • Chobanian, A.V., Bakris, G.L., Black, H.R., Cushman, W.C., Green, L.A., Izzo Jr, J.L., Jones, D.W., Materson, B.J., Oparil, S., Wright Jr., J.T., Roccella, E.J. and National High Blood Pressure Education Program Coordinating Committee (2003) 'The seventh report of the joint national committee on prevention, detection, evaluation, and treatment of high blood pressure', Hypertension, Vol. 42, No. 6, pp.1206-1252. (Pubitemid 37553153)
    • (2003) Hypertension , vol.42 , Issue.6 , pp. 1206-1252
    • Chobanian, A.V.1    Bakris, G.L.2    Black, H.R.3    Cushman, W.C.4    Green, L.A.5    Izzo Jr., J.L.6    Jones, D.W.7    Materson, B.J.8    Oparil, S.9    Wright Jr., J.T.10    Roccella, E.J.11
  • 41
    • 74049092486 scopus 로고    scopus 로고
    • On the (un)reliability of eavesdropping
    • DOI 10.1504/IJSN.2008.017223
    • Cronin, E., Sherr, M. and Blaze, M. (2008) 'On the (un)reliability of eavesdropping', International Journal of Security and Networks, Vol. 3, No. 2, pp.103-113. (Pubitemid 351292179)
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 103-113
    • Cronin, E.1    Sherr, M.2    Blaze, M.3
  • 42
    • 77949692385 scopus 로고    scopus 로고
    • Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees
    • Dalton II, G., Edge, K.S., Mills, R.F. and Raines, R.A. (2010) 'Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.87-95.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 87-95
    • Dalton, I.I.G.1    Edge, K.S.2    Mills, R.F.3    Raines, R.A.4
  • 44
    • 80053579044 scopus 로고    scopus 로고
    • DICOM, accessed on 13 October 2010
    • DICOM (2010) DICOM Strategic Document, Version 10.0. Available online at: http://medical.nema.org/dicom/geninfo/Strategy.pdf (accessed on 13 October 2010).
    • (2010) DICOM Strategic Document, Version 10. 0
  • 45
    • 3042632321 scopus 로고    scopus 로고
    • Inventing wellness systems for aging in place
    • Dishman, E. (2004) 'Inventing wellness systems for aging in place', IEEE Computer, Vol. 37, No. 5, pp.34-41.
    • (2004) IEEE Computer , vol.37 , Issue.5 , pp. 34-41
    • Dishman, E.1
  • 46
    • 70349950718 scopus 로고    scopus 로고
    • Blackhole-resistant ENADAIR-based routing protocol for mobile ad hoc networks
    • Djenouri, D., Bouamama, M. and Mahmoudi, O. (2009) 'Blackhole-resistant ENADAIR-based routing protocol for mobile ad hoc networks', International Journal of Security and Networks, Vol. 4, No. 4, pp.246-262.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 246-262
    • Djenouri, D.1    Bouamama, M.2    Mahmoudi, O.3
  • 47
    • 77949729303 scopus 로고    scopus 로고
    • Experimental analysis of application-level intrusion detection algorithms
    • Dong, Y., Hsu, S., Rajput, S. and Wu, B. (2010) 'Experimental analysis of application-level intrusion detection algorithms', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.198-205.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 198-205
    • Dong, Y.1    Hsu, S.2    Rajput, S.3    Wu, B.4
  • 49
    • 32844472035 scopus 로고    scopus 로고
    • Wearable systems in nursing home care: Prototyping experience
    • Drugge, M., Hallberg, J., Parnes, P. and Synnes, K. (2006) 'Wearable systems in nursing home care: prototyping experience', IEEE Pervasive Computing, Vol. 5, No. 1, pp.87-91.
    • (2006) IEEE Pervasive Computing , vol.5 , Issue.1 , pp. 87-91
    • Drugge, M.1    Hallberg, J.2    Parnes, P.3    Synnes, K.4
  • 50
    • 0004175009 scopus 로고    scopus 로고
    • 6th ed., Cover Publishing Company, Tampa, FL
    • Durbin, D. (2000) Rapid Interpretation of EKGs, 6th ed., Cover Publishing Company, Tampa, FL.
    • (2000) Rapid Interpretation of EKGs
    • Durbin, D.1
  • 51
    • 0033351224 scopus 로고    scopus 로고
    • Networks for homes
    • DOI 10.1109/6.809120
    • Dutta-Roy, A. (1999) 'Networks for homes', IEEE Spectrum, Vol. 36, No. 12, pp.26-33. (Pubitemid 30548839)
    • (1999) IEEE Spectrum , vol.36 , Issue.12 , pp. 26-33
    • Dutta-Roy Amitava1
  • 52
    • 68149180871 scopus 로고    scopus 로고
    • Intrusion detection system for denial-of-service flooding attacks in SIP communication networks
    • Ehlert, S., Rebahi, Y. and Magedanz, T. (2009) 'Intrusion detection system for denial-of-service flooding attacks in SIP communication networks', International Journal of Security and Networks, Vol. 4, No. 3, pp.189-200.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 189-200
    • Ehlert, S.1    Rebahi, Y.2    Magedanz, T.3
  • 53
    • 74049111426 scopus 로고    scopus 로고
    • Hash-AV: Fast virus signature scanning by cache-resident filters
    • Erdogan, O. and Cao, P. (2007) 'Hash-AV: fast virus signature scanning by cache-resident filters', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.50-59.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 50-59
    • Erdogan, O.1    Cao, P.2
  • 63
    • 77949732329 scopus 로고    scopus 로고
    • Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
    • Guo, H., Mu, Y., Zhang, X.Y. and Li, Z.J. (2010) 'Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.173-187.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 173-187
    • Guo, H.1    Mu, Y.2    Zhang, X.Y.3    Li, Z.J.4
  • 64
    • 78650656608 scopus 로고    scopus 로고
    • Detect DDoS flooding attacks in mobile ad hoc networks
    • Guo, Y. and Perreau, S. (2010) 'Detect DDoS flooding attacks in mobile ad hoc networks', International Journal of Security and Networks, Vol. 5, No. 4, pp.259-269.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.4 , pp. 259-269
    • Guo, Y.1    Perreau, S.2
  • 68
    • 68149086398 scopus 로고    scopus 로고
    • Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
    • Hoeper, K. and Gong, G. (2007) 'Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.239-250.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 239-250
    • Hoeper, K.1    Gong, G.2
  • 69
    • 77949844099 scopus 로고    scopus 로고
    • An efficient secure data dissemination scheme for grid structure wireless sensor networks
    • Hsiao, Y. and Hwang, R. (2010) 'An efficient secure data dissemination scheme for grid structure wireless sensor networks', International Journal of Security and Networks, Vol. 5, No. 1, pp.26-34.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 26-34
    • Hsiao, Y.1    Hwang, R.2
  • 71
    • 79951648076 scopus 로고    scopus 로고
    • LIP: A lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
    • Hsu, H., Zhu, S. and Hurson, A.R. (2007) 'LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.202-215.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 202-215
    • Hsu, H.1    Zhu, S.2    Hurson, A.R.3
  • 72
    • 2342532327 scopus 로고    scopus 로고
    • QoS considerations in wireless sensor networks for telemedicine
    • Orlando, FL, USA
    • Hu, F. and Kumar, S. (2003) 'QoS considerations in wireless sensor networks for telemedicine', Proceedings of SPIE ITCOM Conference, Orlando, FL, USA.
    • (2003) Proceedings of SPIE ITCOM Conference
    • Hu, F.1    Kumar, S.2
  • 73
    • 59549091540 scopus 로고    scopus 로고
    • Error-resistant RFIDassisted wireless sensor networks for cardiac telehealthcare
    • Hu, F., Celentano, L. and Xiao, Y. (2009a) 'Error-resistant RFIDassisted wireless sensor networks for cardiac telehealthcare', Wireless Communications and Mobile Computing (WCMC) Journal, Vol. 9, No. 1, pp.85-101.
    • (2009) Wireless Communications and Mobile Computing (WCMC) Journal , vol.9 , Issue.1 , pp. 85-101
    • Hu, F.1    Celentano, L.2    Xiao, Y.3
  • 74
    • 70349968010 scopus 로고    scopus 로고
    • Attacks and countermeasures in multi-hop cognitive radio networks
    • Hu, F., Dong, D. and Xiao, Y. (2009b) 'Attacks and countermeasures in multi-hop cognitive radio networks', International Journal of Security and Networks, Vol. 4, No. 4, pp.263-271.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 263-271
    • Hu, F.1    Dong, D.2    Xiao, Y.3
  • 75
    • 44349157008 scopus 로고    scopus 로고
    • Low-cost wireless sensor networks for remote cardiac patients monitoring applications
    • DOI 10.1002/wcm.488
    • Hu, F., Jiang, M. and Xiao, Y. (2008a) 'Low-cost wireless sensor networks for remote cardiac patients monitoring applications', Wireless Communications and Mobile Computing, Vol. 8, No. 4, pp.513-529. (Pubitemid 351747464)
    • (2008) Wireless Communications and Mobile Computing , vol.8 , Issue.4 , pp. 513-529
    • Hu, F.1    Jiang, M.2    Xiao, Y.3
  • 76
    • 46449131007 scopus 로고    scopus 로고
    • Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining
    • Hu, F., Jiang, M., Celentano, L. and Xiao, Y. (2008b) 'Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining', Ad Hoc Network, Vol. 6, No. 7, pp.986-1012.
    • (2008) Ad Hoc Network , vol.6 , Issue.7 , pp. 986-1012
    • Hu, F.1    Jiang, M.2    Celentano, L.3    Xiao, Y.4
  • 77
    • 36348989550 scopus 로고    scopus 로고
    • Towards a secure, RFID/Sensor based tele-cardiology system
    • Hu, F., Kumar, S. and Xiao, Y. (2006a) 'Towards a secure, RFID/Sensor based tele-cardiology system', IEEE CCNC'07, 5 September, pp.732-736.
    • (2006) IEEE CCNC'07, 5 September , pp. 732-736
    • Hu, F.1    Kumar, S.2    Xiao, Y.3
  • 78
    • 79951662876 scopus 로고    scopus 로고
    • Towards a realistic testbed for wireless network reliability and security performance studies
    • DOI 10.1504/IJSN.2008.016203
    • Hu, F., Rughoonundon, A. and Celentano, L. (2008c) 'Towards a realistic testbed for wireless network reliability and security performance studies', International Journal of Security and Networks, Vol. 3, No. 1, pp.63-77. (Pubitemid 351546023)
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 63-77
    • Hu, F.1    Rughoonundon, A.2    Celentano, L.3
  • 79
    • 33644638914 scopus 로고    scopus 로고
    • Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations
    • DOI 10.1109/TMC.2006.1599408
    • Hu, F., Wang, Y. and Wu, H. (2006b) 'Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations', IEEE Transactions on Mobile Computing, Vol. 5, No. 4, pp.404-417. (Pubitemid 43327126)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.4 , pp. 404-417
    • Hu, F.1    Wang, Y.2    Wu, H.3
  • 81
    • 66249092571 scopus 로고    scopus 로고
    • Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
    • Huang, D. (2007) 'Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.272-283.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 272-283
    • Huang, D.1
  • 82
    • 70349968221 scopus 로고    scopus 로고
    • Handling inheritance violation for secure interoperation of heterogeneous systems
    • Huang, H., Kirchner, H., Liu, S. and Wu, W. (2009) 'Handling inheritance violation for secure interoperation of heterogeneous systems', International Journal of Security and Networks, Vol. 4, No. 4, pp.223-233.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 223-233
    • Huang, H.1    Kirchner, H.2    Liu, S.3    Wu, W.4
  • 83
    • 77949801623 scopus 로고    scopus 로고
    • Authentication and secret search mechanisms for RFID-aware wireless sensor networks
    • Huang, S. and Shieh, S. (2010) 'Authentication and secret search mechanisms for RFID-aware wireless sensor networks', International Journal of Security and Networks, Vol. 5, No. 1, pp.15-25.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 15-25
    • Huang, S.1    Shieh, S.2
  • 84
    • 0037774678 scopus 로고    scopus 로고
    • Implementation of a WAPbased telemedicine system for patient monitoring
    • Hung, K. and Zhang, Y.T. (2003) 'Implementation of a WAPbased telemedicine system for patient monitoring', IEEE Transactions on Information Technology in Biomedicine, Vol. 7, No. 2, pp.101-107.
    • (2003) IEEE Transactions on Information Technology in Biomedicine , vol.7 , Issue.2 , pp. 101-107
    • Hung, K.1    Zhang, Y.T.2
  • 85
  • 87
    • 77949759554 scopus 로고    scopus 로고
    • Secure and efficient data transmission in RFID sensor networks
    • Imasaki, Y., Zhang, Y. and Ji, Y. (2010) 'Secure and efficient data transmission in RFID sensor networks', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.119-127.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 119-127
    • Imasaki, Y.1    Zhang, Y.2    Ji, Y.3
  • 89
    • 10644233142 scopus 로고    scopus 로고
    • Guest editorial introduction to the special section on M-health: Beyond seamless mobility and global wireless health-care connectivity
    • Istepanian, R.S.H., Jovanov, E. and Zhang, Y.T. (2004) 'Guest editorial introduction to the special section on M-health: beyond seamless mobility and global wireless health-care connectivity', IEEE Transactions on Information Technology in Biomedicine, Vol. 8, No. 4, pp.405-414.
    • (2004) IEEE Transactions on Information Technology in Biomedicine , vol.8 , Issue.4 , pp. 405-414
    • Istepanian, R.S.H.1    Jovanov, E.2    Zhang, Y.T.3
  • 92
    • 18244373181 scopus 로고    scopus 로고
    • A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation
    • Jovanov, E., Milenkovic, A., Otto, C. and de Goroen, P.C. (2005) 'A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation', Journal of NeuroEngineering and Rehabilitation, Vol. 2, No. 6.
    • (2005) Journal of NeuroEngineering and Rehabilitation , vol.2 , Issue.6
    • Jovanov, E.1    Milenkovic, A.2    Otto, C.3    De Goroen, P.C.4
  • 94
    • 79551651366 scopus 로고    scopus 로고
    • Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
    • Kandikattu, R. and Jacob, L. (2008) 'Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks', International Journal of Security and Networks, Vol. 3, No. 4, pp.258-274.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.4 , pp. 258-274
    • Kandikattu, R.1    Jacob, L.2
  • 98
    • 0033458126 scopus 로고    scopus 로고
    • Efficiency analysis of a multi-specialty telemedicine service
    • DOI 10.1089/107830299312014
    • Krupinski, E.A., Webster, P., Dolliver, M., Weinstein, R.S. and Lopez, A.M. (1999) 'Efficiency analysis of a multi-specialty telemedicine service', Telemedicine Journal, Vol. 5, No. 3, pp.265-271. (Pubitemid 30012301)
    • (1999) Telemedicine Journal , vol.5 , Issue.3 , pp. 265-271
    • Krupinski, E.1    Webster, P.2    Dolliver, M.3    Weinstein, R.S.4    Lopez, A.M.5
  • 100
    • 61849158147 scopus 로고    scopus 로고
    • Designing user studies for security applications: A case study with wireless network configuration
    • Kuo, C., Perrig, A. and Walker, J. (2009) 'Designing user studies for security applications: a case study with wireless network configuration', International Journal of Security and Networks, Vol. 409, Nos. 1/2, pp.101-109.
    • (2009) International Journal of Security and Networks , vol.409 , Issue.1-2 , pp. 101-109
    • Kuo, C.1    Perrig, A.2    Walker, J.3
  • 105
    • 68149158275 scopus 로고    scopus 로고
    • An efficient one-time password authentication scheme using a smart card
    • Lee, S. and Sivalingam, K.M. (2009) 'An efficient one-time password authentication scheme using a smart card', International Journal of Security and Networks, Vol. 4, No. 3, pp.145-152.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 145-152
    • Lee, S.1    Sivalingam, K.M.2
  • 106
    • 77949760270 scopus 로고    scopus 로고
    • An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
    • Leng, X., Lien, Y., Mayes, K. and Markantonakis, K. (2010) 'An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.79-86.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 79-86
    • Leng, X.1    Lien, Y.2    Mayes, K.3    Markantonakis, K.4
  • 107
    • 79954614519 scopus 로고    scopus 로고
    • Secure and privacy-preserving information aggregation for smart grids
    • Li, F., Luo, B. and Liu, P. (2011) 'Secure and privacy-preserving information aggregation for smart grids', International Journal of Security and Networks, Vol. 6, No. 1, pp.28-39.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.1 , pp. 28-39
    • Li, F.1    Luo, B.2    Liu, P.3
  • 108
    • 77954327354 scopus 로고    scopus 로고
    • PVFS: A probabilistic voting-based filtering scheme in wireless sensor networks
    • Li, F., Srinivasan, A. and Wu, J. (2008a) 'PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks', International Journal of Security and Networks, Vol. 3, No. 3, pp.173-182.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 173-182
    • Li, F.1    Srinivasan, A.2    Wu, J.3
  • 109
    • 77952481544 scopus 로고    scopus 로고
    • ID-based threshold proxy signcryption scheme from bilinear pairings
    • Li, F., Xin, X. and Hu, Y. (2008b) 'ID-based threshold proxy signcryption scheme from bilinear pairings', International Journal of Security and Networks, Vol. 3, No. 3, pp.206-215.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 206-215
    • Li, F.1    Xin, X.2    Hu, Y.3
  • 110
    • 79551652560 scopus 로고    scopus 로고
    • DKMS: Distributed hierarchical access control for multimedia networks
    • Li, R., Li, J. and Chen, H. (2007) 'DKMS: distributed hierarchical access control for multimedia networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.3-10.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 3-10
    • Li, R.1    Li, J.2    Chen, H.3
  • 111
    • 51849141536 scopus 로고    scopus 로고
    • A novel localised authentication scheme in IEEE 802.11 based wireless mesh networks
    • DOI 10.1504/IJSN.2008.017225
    • Lin, X., Ling, X., Zhu, H., Ho, P. and Shen, X. (2008) 'A novel localised authentication scheme in IEEE 802.11 based wireless mesh networks', International Journal of Security and Networks, Vol. 3, No. 2, pp.122-132. (Pubitemid 351292181)
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 122-132
    • Lin, X.1    Ling, X.2    Zhu, H.3    Ho, P.-H.4    Shen, X.S.5
  • 112
    • 79551646922 scopus 로고    scopus 로고
    • End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
    • Ling, H. and Znati, T. (2007) 'End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.109-121.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 109-121
    • Ling, H.1    Znati, T.2
  • 113
    • 36348935486 scopus 로고    scopus 로고
    • A sensor network architecture for cardiac health monitoring
    • DOI 10.1109/CCNC.2007.150, 4199238, 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
    • Liszka, K.J. (2007, January) 'A sensor network architecture for cardiac health monitoring', The 4th IEEE Consumer Communications and Networking Conference (CCNC 2007), Las Vegas, NV, USA, pp.737-740. (Pubitemid 350141526)
    • (2007) 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007 , pp. 737-740
    • Liszka, K.J.1
  • 115
    • 12744252915 scopus 로고    scopus 로고
    • Remote monitoring of a heterogeneous sensor network for biomedical research in space
    • Proceedings of the International Conference on Wireless Networks, ICWN'04 - Proceedings of the International Conference on Pervasive Computing and Communications, PCC'04
    • Liszka, K.J., York, D.W., Mackin, M.A. and Lichter, M.J. (2004b, June) 'Remote monitoring of a heterogeneous sensor network for biomedical research in space', Proceedings of the International Conference on Pervasive Computing and Communications, CSREA Press, pp.829-833. (Pubitemid 40157334)
    • (2004) Proceedings of the International Conference on Wireless Networks, ICWN'04 , vol.2 , pp. 829-833
    • Liszka, K.J.1    York, D.W.2    Rosenbaum, D.S.3    Mackint, M.A.4    Lichter, M.J.5
  • 116
    • 79551645150 scopus 로고    scopus 로고
    • An one-way function based framework for pairwise key establishment in sensor networks
    • Ma, L., Teymorian, A.Y., Xing, K. and Du, D. (2008) 'An one-way function based framework for pairwise key establishment in sensor networks', International Journal of Security and Networks, Vol. 3, No. 4, pp.217-225.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.4 , pp. 217-225
    • Ma, L.1    Teymorian, A.Y.2    Xing, K.3    Du, D.4
  • 117
    • 79951647154 scopus 로고    scopus 로고
    • Verifying security protocols by knowledge analysis
    • Ma, X. and Cheng, X. (2008) 'Verifying security protocols by knowledge analysis', International Journal of Security and Networks, Vol. 3, No. 3, pp.183-192.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 183-192
    • Ma, X.1    Cheng, X.2
  • 120
    • 74549116861 scopus 로고    scopus 로고
    • Securing Wi-Fi networks with position verification: Extended version
    • Malaney, R. (2007) 'Securing Wi-Fi networks with position verification: extended version', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.27-36.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 27-36
    • Malaney, R.1
  • 121
    • 77949837905 scopus 로고    scopus 로고
    • A backpressure technique for filtering spoofed traffic at upstream routers
    • Malliga, S. and Tamilarasi, A. (2010) 'A backpressure technique for filtering spoofed traffic at upstream routers', International Journal of Security and Networks, Vol. 5, No. 1, pp.3-14.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 3-14
    • Malliga, S.1    Tamilarasi, A.2
  • 123
    • 2342539792 scopus 로고    scopus 로고
    • Accelerometry: Providing an integrated, practical method for long-term, ambulatory monitoring of human movement
    • April
    • Mathie, M., Coster, A., Lovell, N. and Celler, B. (2004, April) 'Accelerometry: providing an integrated, practical method for long-term, ambulatory monitoring of human movement', Physiological Measurement, Vol. 25, No. 2.
    • (2004) Physiological Measurement , vol.25 , Issue.2
    • Mathie, M.1    Coster, A.2    Lovell, N.3    Celler, B.4
  • 125
    • 61849133288 scopus 로고    scopus 로고
    • Seeing-is-believing: Using camera phones for human-verifiable authentication
    • McCune, J., Perrig, A. and Reiter, M. (2009) 'Seeing-is-believing: using camera phones for human-verifiable authentication', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.43-56.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 43-56
    • McCune, J.1    Perrig, A.2    Reiter, M.3
  • 129
    • 33746764996 scopus 로고    scopus 로고
    • Wireless sensor networks for personal health monitoring: Issues and an implementation
    • DOI 10.1016/j.comcom.2006.02.011, PII S0140366406000508
    • Milenković, A., Otto, C. and Jovanov, E. (2006) 'Wireless sensor networks for personal health monitoring: issues and an implementation', Computer Communications, Vol. 29, Nos. 13/14, pp.2521-2533. (Pubitemid 44162982)
    • (2006) Computer Communications , vol.29 , Issue.13-14 , pp. 2521-2533
    • Milenkovic, A.1    Otto, C.2    Jovanov, E.3
  • 130
    • 36348983213 scopus 로고    scopus 로고
    • On security attacks in healthcare WSNs implemented on 802.15.4 beacon enabled clusters
    • DOI 10.1109/CCNC.2007.151, 4199239, 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
    • Mišić, J., Amini, F. and Khan, M. (2007, January.) 'On security attacks in healthcare WSNs implemented on 802.15.4 beacon enabled clusters', The 4th IEEE Conference on Consumer Communications and Networking (CCNC 2007), Las Vegas, NV, USA, pp.741-745. (Pubitemid 350141527)
    • (2007) 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007 , pp. 741-745
    • Misic, J.1    Amini, F.2    Khan, M.3
  • 131
    • 33750030809 scopus 로고    scopus 로고
    • Implementation of security policy for clinical information systems over wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.008, PII S1570870506000461, Security Issues in Sensor and Ad Hoc Networks
    • Mišić, J. and Mišić, V.B. (2007) 'Implementation of security policy for clinical information systems over wireless sensor networks', Ad Hoc Networks, Vol. 5, No. 1, pp.134-144. (Pubitemid 44573004)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 134-144
    • Misic, J.1    Misic, V.B.2
  • 133
    • 0033888723 scopus 로고    scopus 로고
    • Home RF: Wireless networking for the connected home
    • Negus, K.J., Stephens, A.P. and Lansford, J. (2000) 'Home RF: wireless networking for the connected home', IEEE Personal Communications, Vol. 7, No. 1, pp.20-27.
    • (2000) IEEE Personal Communications , vol.7 , Issue.1 , pp. 20-27
    • Negus, K.J.1    Stephens, A.P.2    Lansford, J.3
  • 134
    • 71649087488 scopus 로고    scopus 로고
    • Using PLSI-U to detect insider threats by datamining e-mail
    • DOI 10.1504/IJSN.2008.017224
    • Okolica, J.S., Peterson, G.L. and Mills, R.F. (2008) 'Using PLSI-U to detect insider threats by datamining e-mail', International Journal of Security and Networks, Vol. 3, No. 2, pp.114-121. (Pubitemid 351292180)
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 114-121
    • Okolica, J.L.1    Peterson, G.L.2    Mills, R.F.3
  • 136
    • 74549175881 scopus 로고    scopus 로고
    • Security overhead and performance for aggregation with fragment retransmission (AFR) in very highspeed wireless 802.11 LANs
    • Olteanu, A. and Xiao, Y. (2010) 'Security overhead and performance for aggregation with fragment retransmission (AFR) in very highspeed wireless 802.11 LANs', IEEE Transactions on Wireless Communications, Vol. 9, No. 1, pp.218-226.
    • (2010) IEEE Transactions on Wireless Communications , vol.9 , Issue.1 , pp. 218-226
    • Olteanu, A.1    Xiao, Y.2
  • 137
    • 0033001284 scopus 로고    scopus 로고
    • Need for a revision of the normal limits of resting heart rate
    • Palatini, P. (1999) 'Need for a revision of the normal limits of resting heart rate', Hypertension, Vol. 33, No. 2, pp.622-625. (Pubitemid 29091637)
    • (1999) Hypertension , vol.33 , Issue.2 , pp. 622-625
    • Palatini, P.1
  • 138
    • 79551647519 scopus 로고    scopus 로고
    • Vulnerabilities in distanceindexed IP traceback schemes
    • Pan, J., Cai, L. and Shen, X. (2007) 'Vulnerabilities in distanceindexed IP traceback schemes', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.81-94.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 81-94
    • Pan, J.1    Cai, L.2    Shen, X.3
  • 142
    • 12744251529 scopus 로고    scopus 로고
    • Embedded web technology: Applying world wide web standards to embedded systems
    • March, AIAA- 2001-5107
    • Ponyik, J.G. and York, D.W. (2002, March) 'Embedded web technology: applying world wide web standards to embedded systems', NASA TM-2002-211199, AIAA-2001-5107.
    • (2002) NASA TM-2002-211199
    • Ponyik, J.G.1    York, D.W.2
  • 143
    • 33846906776 scopus 로고    scopus 로고
    • Cuff-less and noninvasive measurements of arterial blood pressure by pulse transit time
    • 1615827, Proceedings of the 2005 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEE-EMBS 2005
    • Poon, C.C.Y. and Zhang, Y. (2005, September) 'Cuff-less and noninvasive measurements of arterial blood pressure by pulse transit time', Proceedings of 27th IEEE International Conference of Engineering in Medicine and Biology Society, Shanghai, China, pp.5877-5880. (Pubitemid 46230299)
    • (2005) Annual International Conference of the IEEE Engineering in Medicine and Biology - Proceedings , vol.7 , pp. 5877-5880
    • Poon, C.C.Y.1    Zhang, Y.T.2
  • 144
    • 33646948221 scopus 로고    scopus 로고
    • A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health
    • DOI 10.1109/MCOM.2006.1632652
    • Poon, C.C.Y., Zhang, Y. and Bao, S. (2006) 'A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-Health', IEEE Communications Magazine, Vol. 44, No. 4, pp.73-81. (Pubitemid 43792671)
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 73-81
    • Poon, C.C.Y.1    Zhang, Y.-T.2    Bao, S.-D.3
  • 145
  • 147
    • 77949750049 scopus 로고    scopus 로고
    • A ubiquitous mobile telemedicine system for the elderly using RFID
    • Raad, M. (2010) 'A ubiquitous mobile telemedicine system for the elderly using RFID', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.156-164.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 156-164
    • Raad, M.1
  • 148
    • 79551643767 scopus 로고    scopus 로고
    • Secure message delivery in publish/subscribe networks using overlay multicast
    • Rabinovich, P. and Simon, R. (2007) 'Secure message delivery in publish/subscribe networks using overlay multicast', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.60-70.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 60-70
    • Rabinovich, P.1    Simon, R.2
  • 151
    • 77955714466 scopus 로고    scopus 로고
    • Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
    • Ray, I. and Poolsappasit, N. (2008) 'Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents', International Journal of Security and Networks, Vol. 3, No. 2, pp.80-94.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 80-94
    • Ray, I.1    Poolsappasit, N.2
  • 152
    • 70349949111 scopus 로고    scopus 로고
    • Visibility: A novel concept for characterising provable network digital evidences
    • Rekhis, S. and Boudriga, N.A. (2009) 'Visibility: a novel concept for characterising provable network digital evidences', International Journal of Security and Networks, Vol. 4, No. 4, pp.234-245.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 234-245
    • Rekhis, S.1    Boudriga, N.A.2
  • 153
    • 77949752019 scopus 로고    scopus 로고
    • Security assessments of IEEE 802.15.4 standard based on X.805 framework
    • Richard, A.O., Ahmad, A. and Kiseon, K. (2010) 'Security assessments of IEEE 802.15.4 standard based on X.805 framework', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.188-197.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 188-197
    • Richard, A.O.1    Ahmad, A.2    Kiseon, K.3
  • 154
    • 77949666177 scopus 로고    scopus 로고
    • Perceived barriers to the widespread commercial use of radio frequency identification technology
    • Rodrigues, M.J. and James, K. (2010) 'Perceived barriers to the widespread commercial use of radio frequency identification technology', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.165-172.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 165-172
    • Rodrigues, M.J.1    James, K.2
  • 155
    • 0029909539 scopus 로고    scopus 로고
    • Predicting sudden cardiac death from T wave alternans of the surface electrocardiogram: Promise and pitfalls
    • Rosenbaum, D.S., Albrecht, P. and Cohen, R.J. (1996) 'Predicting sudden cardiac death from microvolt T-wave alternans of the surface electrocardiogram: promise and pitfalls', Journal of Cardiovascular Electrophysiology, Vol. 7, pp.1095-1111. (Pubitemid 26389425)
    • (1996) Journal of Cardiovascular Electrophysiology , vol.7 , Issue.11 , pp. 1095-1111
    • Rosenbaum, D.S.1    Albrecht, P.2    Cohen, R.J.3
  • 157
    • 57349142855 scopus 로고    scopus 로고
    • Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
    • Middleware 2001
    • Rowstron, A. and Druschel P. (2001) 'Pastry: scalable, distributed object location and routing for large-scale peer-to-peer systems', Proceedings of 4th IFIP/ACM International Conferences on Distributed Systems Platforms, ACM Press, pp.329-350. (Pubitemid 33362020)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2218 , pp. 329-350
    • Rowstron, A.1    Druschel, P.2
  • 161
    • 85086420396 scopus 로고    scopus 로고
    • Syntax vs. semantics: Competing approaches to dynamic network intrusion detection
    • DOI 10.1504/IJSN.2008.016199
    • Scheirer, W. and Chuah, M. (2008) 'Syntax vs. semantics: competing approaches to dynamic network intrusion detection', International Journal of Security and Networks, Vol. 3, No. 1, pp.24-35. (Pubitemid 351546019)
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 24-35
    • Scheirer, W.1    Chuah, M.C.2
  • 172
    • 74549171036 scopus 로고    scopus 로고
    • On pairwise connectivity of wireless multihop networks
    • Sun, F. and Shayman, M. (2007) 'On pairwise connectivity of wireless multihop networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.37-49.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.1-2 , pp. 37-49
    • Sun, F.1    Shayman, M.2
  • 173
    • 77949694146 scopus 로고    scopus 로고
    • Security and privacy on low-cost radio frequency identification systems
    • Sun, L. (2010) 'Security and privacy on low-cost radio frequency identification systems', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.128-134.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 128-134
    • Sun, L.1
  • 174
    • 61849117271 scopus 로고    scopus 로고
    • Standards for security associations in personal networks: A comparative analysis
    • Suomalainen, J., Valkonen, J. and Asokan, N. (2009) 'Standards for security associations in personal networks: a comparative analysis', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.87-100.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 87-100
    • Suomalainen, J.1    Valkonen, J.2    Asokan, N.3
  • 177
    • 26444490086 scopus 로고    scopus 로고
    • TARA: Thermal-Aware Routing Algorithm for implanted sensor networks
    • Distributed Computing in Sensor Systems: First IEEE International Conference, DCOSS 2005. Proceedings
    • Tang, Q., Tummala, N., Gupta, S.K.S. and Schwiebert, L. (2005) 'TARA: thermal-aware routing algorithm for implanted sensor networks', Proceedings of the International Conference on Distributed Computing in Sensor Systems, pp.206-217. (Pubitemid 41425118)
    • (2005) Lecture Notes in Computer Science , vol.3560 , pp. 206-217
    • Tang, Q.1    Tummala, N.2    Gupta, S.K.S.3    Schwiebert, L.4
  • 178
    • 85016433011 scopus 로고    scopus 로고
    • Efficient multicast stream authentication for the fully adversarial network model
    • Tartary, C. and Wang, H. (2007) 'Efficient multicast stream authentication for the fully adversarial network model', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.175-191.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 175-191
    • Tartary, C.1    Wang, H.2
  • 180
    • 79951661564 scopus 로고    scopus 로고
    • Secure user-identification and key distribution scheme preserving anonymity
    • Tripathy, S. and Nandi, S. (2008) 'Secure user-identification and key distribution scheme preserving anonymity', International Journal of Security and Networks, Vol. 3, No. 3, pp.201-205.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 201-205
    • Tripathy, S.1    Nandi, S.2
  • 181
    • 77949817850 scopus 로고    scopus 로고
    • Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
    • Tsai, K., Hsu, C. and Wu, T. (2010) 'Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks', International Journal of Security and Networks, Vol. 5, No. 1, pp.45-52.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 45-52
    • Tsai, K.1    Hsu, C.2    Wu, T.3
  • 182
    • 0034241931 scopus 로고    scopus 로고
    • Physiology of a microgravity environment invited review: What do we know about the effects of spaceflight on bone?
    • Turner, R.T. (2000, August) 'Physiology of a microgravity environment: invited review: what do we know about the effects of spaceflight on bone?', Journal of Applied Physiology, Vol. 89, pp.840-847. (Pubitemid 30637135)
    • (2000) Journal of Applied Physiology , vol.89 , Issue.2 , pp. 840-847
    • Turner, R.T.1
  • 183
    • 0004035658 scopus 로고    scopus 로고
    • United Nations Population Division, accessed on 13 October 2010
    • United Nations Population Division (2001) World Population Prospects: The 2000 Revision. Available online at: http://www.un.org/spanish/esa/population/ wpp2000h.pdf (accessed on 13 October 2010).
    • (2001) World Population Prospects: The 2000 Revision
  • 184
    • 72549101766 scopus 로고    scopus 로고
    • An agent-based framework for intrusion detection alert verification and event correlation
    • Uphoff, B. and Wong, J.S. (2008) 'An agent-based framework for intrusion detection alert verification and event correlation', International Journal of Security and Networks, Vol. 3, No. 3, pp.193-200.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 193-200
    • Uphoff, B.1    Wong, J.S.2
  • 187
    • 77949830969 scopus 로고    scopus 로고
    • A cross-layer authentication design for secure video transportation in wireless sensor network
    • Wang, J. and Smith, G.L. (2010) 'A cross-layer authentication design for secure video transportation in wireless sensor network', International Journal of Security and Networks, Vol. 5, No. 1, pp.63-76.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 63-76
    • Wang, J.1    Smith, G.L.2
  • 188
    • 84899740998 scopus 로고    scopus 로고
    • Visualisation of wormholes in underwater sensor networks: A distributed approach
    • DOI 10.1504/IJSN.2008.016198
    • Wang, W., Kong, J., Bhargava, B. and Gerla, M. (2008) 'Visualisation of wormholes in underwater sensor networks: a distributed approach', International Journal of Security and Networks, Vol. 3, No. 1, pp.10-23. (Pubitemid 351546018)
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 10-23
    • Wang, W.1    Kong, J.2    Bhargava, B.3    Gerla, M.4
  • 191
    • 79954573740 scopus 로고    scopus 로고
    • Mote, (accessed on 13 October 2010)
    • Webopedia (2010) Mote. Available online at: http://www.webopedia.com/ TERM/M/mote.html (accessed on 13 October 2010).
    • (2010) Webopedia
  • 195
    • 18844378578 scopus 로고    scopus 로고
    • Taming the underlying challenges of reliable multihop routing in sensor networks
    • SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems
    • Woo, A., Tong, T. and Culler, D. (2003) 'Taming the underlying challenges of reliable multihop routing in sensor networks', Proceedings of the 1st ACM Conference on Embedded Networked Sensor Systems (SenSys 2003), 5-7 November, Los Angeles, CA, USA, pp.14-27. (Pubitemid 40682331)
    • (2003) SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems , pp. 14-27
    • Woo, A.1    Tong, T.2    Culler, D.3
  • 196
    • 61849158146 scopus 로고    scopus 로고
    • An efficient group key management scheme for mobile ad hoc networks
    • Wu, B., Wu, J. and Dong, Y. (2009) 'An efficient group key management scheme for mobile ad hoc networks', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.125-134.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 125-134
    • Wu, B.1    Wu, J.2    Dong, Y.3
  • 199
    • 80053603333 scopus 로고    scopus 로고
    • Temporal key integrity protocol and its security issues in IEEE 802.11i
    • Wu, S-L. and Tseng, Y-C. (Eds), Chapter 16, Auerbach Publications, Taylor & Francis Group, New York
    • Xiao, Y., Dass, K., Zheng, J. and Wu, K. (2007a) 'Temporal key integrity protocol and its security issues in IEEE 802.11i', in Wu, S-L. and Tseng, Y-C. (Eds): Wireless Ad Hoc Networking: Personal-Area, Local-Area, and Sensory-Area Networks, Chapter 16, Auerbach Publications, Taylor & Francis Group, New York, pp.419-435.
    • (2007) Wireless Ad Hoc Networking: Personal-Area, Local-Area, and Sensory-Area Networks , pp. 419-435
    • Xiao, Y.1    Dass, K.2    Zheng, J.3    Wu, K.4
  • 200
    • 8744292911 scopus 로고    scopus 로고
    • Voice and video transmissions with global data parameter control for the IEEE 802.11e enhance distributed channel access
    • Xiao, Y. and Li, H. (2004) 'Voice and video transmissions with global data parameter control for the IEEE 802.11e enhance distributed channel access', IEEE Transactions on Parallel and Distributed Systems, Vol. 15, No. 11, pp.1041-1053.
    • (2004) IEEE Transactions on Parallel and Distributed Systems , vol.15 , Issue.11 , pp. 1041-1053
    • Xiao, Y.1    Li, H.2
  • 201
    • 33646943487 scopus 로고    scopus 로고
    • Security and privacy in RFID and applications in telemedicine
    • DOI 10.1109/MCOM.2006.1632651
    • Xiao, Y., Shen, X., Sun, B. and Cai, L. (2006b) 'Security and privacy in RFID and applications in telemedicine', IEEE Communications Magazine, Special Issue on Quality Assurance and Devices in Telemedicine, pp.64-72. (Pubitemid 43792670)
    • (2006) IEEE Communications Magazine , vol.44 , Issue.4 , pp. 64-72
    • Xiao, Y.1    Shen, X.2    Sun, B.3    Cai, L.4
  • 202
    • 34247512176 scopus 로고    scopus 로고
    • Radio frequency identification: Technologies, applications, and research issues
    • DOI 10.1002/wcm.365
    • Xiao, Y., Yu, S., Wu, K., Ni, Q., Janecek, C. and Nordstad, J. (2007b) 'Radio frequency identification: technologies, applications, and research issues', Journal of Wireless Communications and Mobile Computing, Vol. 7, No. 4, pp.457-472. (Pubitemid 46659482)
    • (2007) Wireless Communications and Mobile Computing , vol.7 , Issue.4 , pp. 457-472
    • Xiao, Y.1    Yu, S.2    Wu, K.3    Ni, Q.4    Janecek, C.5    Nordstad, J.6
  • 203
    • 62249216277 scopus 로고    scopus 로고
    • Formal modelling and analysis of XML firewall for service-oriented systems
    • Xu, H., Ayachit, M. and Reddyreddy, A. (2008) 'Formal modelling and analysis of XML firewall for service-oriented systems', International Journal of Security and Networks, Vol. 3, No. 3, pp.147-160.
    • (2008) International Journal of Security and Networks , vol.3 , Issue.3 , pp. 147-160
    • Xu, H.1    Ayachit, M.2    Reddyreddy, A.3
  • 204
    • 77949835881 scopus 로고    scopus 로고
    • Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
    • Xu, L., Chen, S., Huang, X. and Mu, Y. (2010) 'Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks', International Journal of Security and Networks, Vol. 5, No. 1, pp.35-44.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 35-44
    • Xu, L.1    Chen, S.2    Huang, X.3    Mu, Y.4
  • 205
    • 77949864345 scopus 로고    scopus 로고
    • Lightweight authentication protocol for mobile RFID networks
    • Yang, M. (2010) 'Lightweight authentication protocol for mobile RFID networks', International Journal of Security and Networks, Vol. 5, No. 1, pp.53-62.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.1 , pp. 53-62
    • Yang, M.1
  • 207
    • 79954585471 scopus 로고    scopus 로고
    • Application-aware secure multicast for power grid communications
    • Zhang, J. and Gunter, C.A. (2011) 'Application-aware secure multicast for power grid communications', International Journal of Security and Networks, Vol. 6, No. 1, pp.40-52.
    • (2011) International Journal of Security and Networks , vol.6 , Issue.1 , pp. 40-52
    • Zhang, J.1    Gunter, C.A.2
  • 210
    • 78650662129 scopus 로고    scopus 로고
    • Enhancing intrusion detection system with proximity information
    • Zhuang, Z., Li, Y. and Chen, Z. (2010) 'Enhancing intrusion detection system with proximity information', International Journal of Security and Networks, Vol. 5, No. 4 pp.207-219.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.4 , pp. 207-219
    • Zhuang, Z.1    Li, Y.2    Chen, Z.3
  • 211
    • 79951619296 scopus 로고    scopus 로고
    • A novel conference key management solution for secure dynamic conferencing
    • DOI 10.1504/IJSN.2008.016201
    • Zou, X. and Karandikar, Y. (2008) 'A novel conference key management solution for secure dynamic conferencing', International Journal of Security and Networks, Vol. 3, No. 1, pp.47-53. (Pubitemid 351546021)
    • (2008) International Journal of Security and Networks , vol.3 , Issue.1 , pp. 47-53
    • Zou, X.1    Karandikar, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.