-
1
-
-
80053616826
-
-
10BLADE, accessed on 13 October 2010
-
10BLADE (2004) iRevive Feature List. Available online at: http://www.10blade.com/irevive.html (accessed on 13 October 2010).
-
(2004)
IRevive Feature List
-
-
-
2
-
-
78650634152
-
Efficient decision tree for protocol analysis in intrusion detection
-
Abbes, T., Bouhoula, A. and Rusinowitch, M. (2010) 'Efficient decision tree for protocol analysis in intrusion detection', International Journal of Security and Networks, Vol. 5, No. 4, pp.220-235.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 220-235
-
-
Abbes, T.1
Bouhoula, A.2
Rusinowitch, M.3
-
3
-
-
79951638712
-
Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol
-
Abdalla, M., Bresson, E., Chevassut, O., Moller, B. and Pointcheval, D. (2007) 'Strong password-based authentication in TLS using the three-party group Diffie-Hellman protocol', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.284-296.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 284-296
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Moller, B.4
Pointcheval, D.5
-
4
-
-
12744266480
-
The aware home: A living laboratory for successful aging
-
Alberta, Canada, July
-
Abowd, G.D., Bobick, A.F., Essa, I.A., Mynatt, E.D. and Rogers, W.A. (2002, July) 'The aware home: a living laboratory for successful aging', Proceedings of AAAI Workshop Automation as Caregiver, Alberta, Canada, pp.1-7.
-
(2002)
Proceedings of AAAI Workshop Automation As Caregiver
, pp. 1-7
-
-
Abowd, G.D.1
Bobick, A.F.2
Essa, I.A.3
Mynatt, E.D.4
Rogers, W.A.5
-
6
-
-
14844340041
-
A novel telemedicine system for the handling of emergency cases
-
New Delhi, India
-
Antoniades, C., Kouppis, A., Pavlopoulos, S., Kyriakou, E., Kyprianou, A., Andreou, A.S., Pattichis, C. and Schizas, C. (2000) 'A novel telemedicine system for the handling of emergency cases', Proceedings of the 5th World Conference on Injury Prevention and Control, World Health Organization (WHO), New Delhi, India.
-
(2000)
Proceedings of the 5th World Conference on Injury Prevention and Control, World Health Organization (WHO)
-
-
Antoniades, C.1
Kouppis, A.2
Pavlopoulos, S.3
Kyriakou, E.4
Kyprianou, A.5
Andreou, A.S.6
Pattichis, C.7
Schizas, C.8
-
7
-
-
39349109602
-
Design and analysis of a multipacket signature detection system
-
Artan, N. and Chao, H. (2007) 'Design and analysis of a multipacket signature detection system', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.122-136.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 122-136
-
-
Artan, N.1
Chao, H.2
-
8
-
-
57349124398
-
Anonymous authentication protocol for GSM networks
-
DOI 10.1504/IJSN.2008.016202
-
Asadpour, M., Sattarzadeh, B. and Movaghar, A. (2008) 'Anonymous authentication protocol for GSM networks', International Journal of Security and Networks, Vol. 3, No. 1, pp.54-62. (Pubitemid 351546022)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 54-62
-
-
Asadpour, M.1
Sattarzadeh, B.2
Movaghar, A.3
-
9
-
-
77949765113
-
Radio frequency identification: A case study of healthcare organisations
-
Azevedo, S.G. and Ferreira, J.J. (2010) 'Radio frequency identification: a case study of healthcare organisations', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.147-155.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 147-155
-
-
Azevedo, S.G.1
Ferreira, J.J.2
-
10
-
-
36349035993
-
-
accessed on 13 October 2010
-
Baard, M. (2004) RFID Keeps Track of Seniors. Available online at: http://www.wired.com/medtech/health/news/2004/03/62723 (accessed on 13 October 2010).
-
(2004)
RFID Keeps Track of Seniors
-
-
Baard, M.1
-
11
-
-
39049112972
-
Energy efficient thermal aware routing algorithms for embedded biomedical sensor networks
-
October, Vancouver, Canada
-
Bag, A. and Bassiouni, M.A. (2006, October) 'Energy efficient thermal aware routing algorithms for embedded biomedical sensor networks', 2006 IEEE International Conference on Mobile Adhoc and Sensor Systems, Vancouver, Canada, pp.604-609.
-
(2006)
2006 IEEE International Conference on Mobile Adhoc and Sensor Systems
, pp. 604-609
-
-
Bag, A.1
Bassiouni, M.A.2
-
12
-
-
70349969846
-
A proactive secret sharing scheme in matrix projection method
-
Bai, L. and Zou, X. (2009) 'A proactive secret sharing scheme in matrix projection method', International Journal of Security and Networks, Vol. 4, No. 4, pp.201-209.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 201-209
-
-
Bai, L.1
Zou, X.2
-
13
-
-
33846925115
-
Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems
-
September, Shanghai, China
-
Bao, S.D. and Zhang, Y.T. (2005, September) 'Physiological signal based entity authentication for body area sensor networks and mobile healthcare systems', Proceedings of 27th IEEE International Conference of Engineering in Medicine and Biology Society, Shanghai, China, pp.2455-2458.
-
(2005)
Proceedings of 27th IEEE International Conference of Engineering in Medicine and Biology Society
, pp. 2455-2458
-
-
Bao, S.D.1
Zhang, Y.T.2
-
14
-
-
33646942258
-
A new symmetric cryptosystem of body area sensor networks for telemedicine
-
April, Japan
-
Bao, S.D., Zhang, Y.T. and Shen, L.F. (2005, April) 'A new symmetric cryptosystem of body area sensor networks for telemedicine', Proceedings of 6th Asian-Pacific Conference on Medical and Biological Engineering, Japan.
-
(2005)
Proceedings of 6th Asian-Pacific Conference on Medical and Biological Engineering
-
-
Bao, S.D.1
Zhang, Y.T.2
Shen, L.F.3
-
15
-
-
0003519699
-
-
C.C. Thomas, Springfield, IL
-
Bashshur, R.L., Armstrong, P.A. and Youssef, Z.I. (1975) Telemedicine: Explorations in the Use of Telecommunications in Health Care, C.C. Thomas, Springfield, IL.
-
(1975)
Telemedicine: Explorations in the Use of Telecommunications in Health Care
-
-
Bashshur, R.L.1
Armstrong, P.A.2
Youssef, Z.I.3
-
16
-
-
0003985798
-
-
C.C. Thomas Publishers, Springfield, IL
-
Bashshur, R.L., Sanders, J.H., Shannon, G.W. and Foundation, B. (1997) Telemedicine: Theory and Practice, C.C. Thomas Publishers, Springfield, IL.
-
(1997)
Telemedicine: Theory and Practice
-
-
Bashshur, R.L.1
Sanders, J.H.2
Shannon, G.W.3
Foundation, B.4
-
19
-
-
61849085156
-
An evaluation of connection characteristics for separating network attacks
-
Berthier, R. and Cukier, M. (2009) 'An evaluation of connection characteristics for separating network attacks', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.110-124.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 110-124
-
-
Berthier, R.1
Cukier, M.2
-
20
-
-
70349961783
-
TKS: A transition key management scheme for secure application level multicast
-
Bettahar, H., Alkubeily, M. and Bouabdallah, A. (2009) 'TKS: a transition key management scheme for secure application level multicast', International Journal of Security and Networks, Vol. 4, No. 4, pp.210-222.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 210-222
-
-
Bettahar, H.1
Alkubeily, M.2
Bouabdallah, A.3
-
21
-
-
57849124555
-
Aggregate designated verifier signatures and application to secure routing
-
Bhaskar, R., Herranz, J. and Laguillaumie, F. (2007) 'Aggregate designated verifier signatures and application to secure routing', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.192-201.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 192-201
-
-
Bhaskar, R.1
Herranz, J.2
Laguillaumie, F.3
-
22
-
-
0141834008
-
Wearable Sensors/Systems and Their Impact on Biomedical Engineering
-
DOI 10.1109/MEMB.2003.1213622
-
Bonato, P. (2003, May/June) 'Wearable sensors/systems and their impact on biomedical engineering', IEEE Engineering in Medicine and Biology Magazine, Vol. 22, No. 2, pp.18-20. (Pubitemid 37328160)
-
(2003)
IEEE Engineering in Medicine and Biology Magazine
, vol.22
, Issue.3
, pp. 18-20
-
-
Bonato, P.1
-
23
-
-
0141833985
-
Data Mining of Motor Patterns Recorded with Wearable Technology
-
DOI 10.1109/MEMB.2003.1213634
-
Bonato, P., Mork, P., Sherrill, D. and Weggaard, R. (2003 May/June) 'Data mining of motor patterns recorded with wearable technology', IEEE Engineering in Medicine and Biology Magazine, Vol. 22, No. 3, pp.110-119. (Pubitemid 37328170)
-
(2003)
IEEE Engineering in Medicine and Biology Magazine
, vol.22
, Issue.3
, pp. 110-119
-
-
Bonato, P.1
Mork, P.J.2
Sherrill, D.M.3
Westgaard, R.H.4
-
24
-
-
79951637895
-
Firewall filtering rules analysis for anomalies detection
-
Bouhoula, A., Trabelsi, Z., Barka, E. and Benelbahri, M. (2008) 'Firewall filtering rules analysis for anomalies detection', International Journal of Security and Networks, Vol. 3, No. 3, pp.161-172.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 161-172
-
-
Bouhoula, A.1
Trabelsi, Z.2
Barka, E.3
Benelbahri, M.4
-
25
-
-
80053605338
-
-
accessed on 13 October 2010
-
Brown, L. (1996) Modern Private Key Ciphers (part 1). Available online at: http://williamstallings.com/Extras/Security-Notes/lectures/blockA.html (accessed on 13 October 2010).
-
(1996)
Modern Private Key Ciphers (Part 1)
-
-
Brown, L.1
-
27
-
-
61849134762
-
Secure pairing with biometrics
-
Buhan, I., Boom, B., Doumen, J., Hartel, P.H. and Veldhuis, R.N.J. (2009) 'Secure pairing with biometrics', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.27-42.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 27-42
-
-
Buhan, I.1
Boom, B.2
Doumen, J.3
Hartel, P.H.4
Veldhuis, R.N.J.5
-
28
-
-
79951598312
-
Origins: An approach to trace fast spreading worms to their roots
-
DOI 10.1504/IJSN.2008.016200
-
Burt, A.L., Darschewski, M., Ray, I., Thurimella, R. and Wu, H. (2008) 'Origins: an approach to trace fast spreading worms to their roots', International Journal of Security and Networks, Vol. 3, No. 1, pp.36-46. (Pubitemid 351546020)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 36-46
-
-
Burt, A.L.1
Darschewski, M.2
Ray, I.3
Thurimella, R.4
Wu, H.5
-
29
-
-
0031879120
-
Quantification of physical activities by means of ambulatory accelerometry: A validation study
-
DOI 10.1017/S0048577298971153
-
Bussmann, J., Tulen, J., van Herel, E. and Stam, H. (1998) 'Quantification of physical activities by means of ambulatory accelerometry: a validation study', Psychophysiology, Vol. 35, No. 5, pp.488-496. (Pubitemid 28376056)
-
(1998)
Psychophysiology
, vol.35
, Issue.5
, pp. 488-496
-
-
Bussmann, J.B.J.1
Tulen, J.H.M.2
Van Herel, E.C.G.3
Stam, H.J.4
-
30
-
-
68149169009
-
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
-
Chakrabarti, S., Chandrasekhar, S. and Singhal, M. (2009) 'An escrow-less identity-based group-key agreement protocol for dynamic peer groups', International Journal of Security and Networks, Vol. 4, No. 3, pp.171-188.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 171-188
-
-
Chakrabarti, S.1
Chandrasekhar, S.2
Singhal, M.3
-
31
-
-
77953145198
-
Adaptive clustering for scalable key management in dynamic group communications
-
DOI 10.1504/IJSN.2008.017226
-
Challal, Y., Gharout, S., Bouabdallah, A. and Bettahar, H. (2008) 'Adaptive clustering for scalable key management in dynamic group communications', International Journal of Security and Networks, Vol. 3, No. 2, pp.133-146. (Pubitemid 351292182)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 133-146
-
-
Challal, Y.1
Gharout, S.2
Bouabdallah, A.3
Bettahar, H.4
-
32
-
-
33745958986
-
Ad-hoc multicast routing on resource-limited sensor nodes
-
REALMAN 2006 - Proceedings of Second International Workshop on Multi-hop Ad Hoc Networks: from Theory to Reality
-
Chen, B., Muniswamy-Reddy, K. and Welsh, M. (2006) 'Ad-hoc multicast routing on resource-limited sensor nodes', Proceedings of 2nd ACM/Sigmobile Workshop on Multi-hop Ad Hoc Networks: From Theory to Reality (REALMAN'06), 26 May, Florence, Italy, pp.87-94. (Pubitemid 44060030)
-
(2006)
REALMAN 2006 - Proceedings of Second International Workshop on Multi-hop Ad Hoc Networks: from Theory to Reality
, vol.2006
, pp. 87-94
-
-
Chen, B.-R.1
Muniswamy-Reddy, K.-K.2
Welsh, M.3
-
33
-
-
85120720332
-
Editorial
-
Chen, H. and Guizani, M. (2007) 'Editorial', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.1-2.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 1-2
-
-
Chen, H.1
Guizani, M.2
-
34
-
-
68149168162
-
Deriving a closed-form expression for worm-scanning strategies
-
Chen, Z., Chen, C. and Li, Y. (2009) 'Deriving a closed-form expression for worm-scanning strategies', International Journal of Security and Networks, Vol. 4, No. 3, pp.135-144.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 135-144
-
-
Chen, Z.1
Chen, C.2
Li, Y.3
-
35
-
-
78650658214
-
On the scalability of Delay-Tolerant Botnets
-
Chen, Z., Chen, C. and Wang, Q. (2010) 'On the scalability of Delay-Tolerant Botnets', International Journal of Security and Networks, Vol. 5, No. 4, pp.248-258.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 248-258
-
-
Chen, Z.1
Chen, C.2
Wang, Q.3
-
36
-
-
34548366188
-
Optimal worm-scanning method using vulnerable-host distributions
-
Chen, Z. and Ji, C. (2007) 'Optimal worm-scanning method using vulnerable-host distributions', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.71-80.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 71-80
-
-
Chen, Z.1
Ji, C.2
-
37
-
-
38049042723
-
On security proof of McCullagh-Barreto's key agreement protocol and its variants
-
Cheng, Z. and Chen, L. (2007) 'On security proof of McCullagh-Barreto's key agreement protocol and its variants', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.251-259.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 251-259
-
-
Cheng, Z.1
Chen, L.2
-
38
-
-
84939435969
-
BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
6-9 October
-
Cherukuri, S., Venkatasubramanian, K.K. and Gupta, S.K.S. (2003) 'BioSec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body', IEEE Proceedings of International Conference on Parallel Processing Workshops, 6-9 October, pp.432-439.
-
(2003)
IEEE Proceedings of International Conference on Parallel Processing Workshops
, pp. 432-439
-
-
Cherukuri, S.1
Venkatasubramanian, K.K.2
Gupta, S.K.S.3
-
39
-
-
67349180187
-
An integrated communications framework for context aware continuous monitoring with body sensor networks
-
Chiti, F., Fantacci, R., Archetti, F., Messina, E. and Toscani, D. (2009) 'An integrated communications framework for context aware continuous monitoring with body sensor networks', IEEE Journal on Selected Areas in Communications, Special Issue on Wireless and Pervasive Communications for Healthcare, Vol. 27, No. 4, pp.379-386.
-
(2009)
IEEE Journal on Selected Areas in Communications, Special Issue on Wireless and Pervasive Communications for Healthcare
, vol.27
, Issue.4
, pp. 379-386
-
-
Chiti, F.1
Fantacci, R.2
Archetti, F.3
Messina, E.4
Toscani, D.5
-
40
-
-
0347423198
-
Seventh report of the Joint National Committee on Prevention, Detection, Evaluation, and Treatment of High Blood Pressure
-
DOI 10.1161/01.HYP.0000107251.49515.c2
-
Chobanian, A.V., Bakris, G.L., Black, H.R., Cushman, W.C., Green, L.A., Izzo Jr, J.L., Jones, D.W., Materson, B.J., Oparil, S., Wright Jr., J.T., Roccella, E.J. and National High Blood Pressure Education Program Coordinating Committee (2003) 'The seventh report of the joint national committee on prevention, detection, evaluation, and treatment of high blood pressure', Hypertension, Vol. 42, No. 6, pp.1206-1252. (Pubitemid 37553153)
-
(2003)
Hypertension
, vol.42
, Issue.6
, pp. 1206-1252
-
-
Chobanian, A.V.1
Bakris, G.L.2
Black, H.R.3
Cushman, W.C.4
Green, L.A.5
Izzo Jr., J.L.6
Jones, D.W.7
Materson, B.J.8
Oparil, S.9
Wright Jr., J.T.10
Roccella, E.J.11
-
41
-
-
74049092486
-
On the (un)reliability of eavesdropping
-
DOI 10.1504/IJSN.2008.017223
-
Cronin, E., Sherr, M. and Blaze, M. (2008) 'On the (un)reliability of eavesdropping', International Journal of Security and Networks, Vol. 3, No. 2, pp.103-113. (Pubitemid 351292179)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 103-113
-
-
Cronin, E.1
Sherr, M.2
Blaze, M.3
-
42
-
-
77949692385
-
Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees
-
Dalton II, G., Edge, K.S., Mills, R.F. and Raines, R.A. (2010) 'Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.87-95.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 87-95
-
-
Dalton, I.I.G.1
Edge, K.S.2
Mills, R.F.3
Raines, R.A.4
-
43
-
-
1542359009
-
A high-throughput path metric for multi-hop wireless routing
-
14-19 September, San Diego, CA, USA
-
De Couto, D.S.J., Aguayo, D., Bicket, J. and Morris, R. (2003) 'A high-throughput path metric for multi-hop wireless routing', Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, 14-19 September, San Diego, CA, USA, pp.134-146.
-
(2003)
Proceedings of the 9th Annual International Conference on Mobile Computing and Networking
, pp. 134-146
-
-
De Couto, D.S.J.1
Aguayo, D.2
Bicket, J.3
Morris, R.4
-
44
-
-
80053579044
-
-
DICOM, accessed on 13 October 2010
-
DICOM (2010) DICOM Strategic Document, Version 10.0. Available online at: http://medical.nema.org/dicom/geninfo/Strategy.pdf (accessed on 13 October 2010).
-
(2010)
DICOM Strategic Document, Version 10. 0
-
-
-
45
-
-
3042632321
-
Inventing wellness systems for aging in place
-
Dishman, E. (2004) 'Inventing wellness systems for aging in place', IEEE Computer, Vol. 37, No. 5, pp.34-41.
-
(2004)
IEEE Computer
, vol.37
, Issue.5
, pp. 34-41
-
-
Dishman, E.1
-
46
-
-
70349950718
-
Blackhole-resistant ENADAIR-based routing protocol for mobile ad hoc networks
-
Djenouri, D., Bouamama, M. and Mahmoudi, O. (2009) 'Blackhole-resistant ENADAIR-based routing protocol for mobile ad hoc networks', International Journal of Security and Networks, Vol. 4, No. 4, pp.246-262.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 246-262
-
-
Djenouri, D.1
Bouamama, M.2
Mahmoudi, O.3
-
47
-
-
77949729303
-
Experimental analysis of application-level intrusion detection algorithms
-
Dong, Y., Hsu, S., Rajput, S. and Wu, B. (2010) 'Experimental analysis of application-level intrusion detection algorithms', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.198-205.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 198-205
-
-
Dong, Y.1
Hsu, S.2
Rajput, S.3
Wu, B.4
-
48
-
-
68149099995
-
Overview of satellite communication networks security: Introduction of EAP
-
Drakakis, K.E., Panagopoulos, A.D. and Cottis, P.G. (2009) 'Overview of satellite communication networks security: introduction of EAP', International Journal of Security and Networks, Vol. 4, No. 3, pp.164-170.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 164-170
-
-
Drakakis, K.E.1
Panagopoulos, A.D.2
Cottis, P.G.3
-
49
-
-
32844472035
-
Wearable systems in nursing home care: Prototyping experience
-
Drugge, M., Hallberg, J., Parnes, P. and Synnes, K. (2006) 'Wearable systems in nursing home care: prototyping experience', IEEE Pervasive Computing, Vol. 5, No. 1, pp.87-91.
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.1
, pp. 87-91
-
-
Drugge, M.1
Hallberg, J.2
Parnes, P.3
Synnes, K.4
-
50
-
-
0004175009
-
-
6th ed., Cover Publishing Company, Tampa, FL
-
Durbin, D. (2000) Rapid Interpretation of EKGs, 6th ed., Cover Publishing Company, Tampa, FL.
-
(2000)
Rapid Interpretation of EKGs
-
-
Durbin, D.1
-
51
-
-
0033351224
-
Networks for homes
-
DOI 10.1109/6.809120
-
Dutta-Roy, A. (1999) 'Networks for homes', IEEE Spectrum, Vol. 36, No. 12, pp.26-33. (Pubitemid 30548839)
-
(1999)
IEEE Spectrum
, vol.36
, Issue.12
, pp. 26-33
-
-
Dutta-Roy Amitava1
-
52
-
-
68149180871
-
Intrusion detection system for denial-of-service flooding attacks in SIP communication networks
-
Ehlert, S., Rebahi, Y. and Magedanz, T. (2009) 'Intrusion detection system for denial-of-service flooding attacks in SIP communication networks', International Journal of Security and Networks, Vol. 4, No. 3, pp.189-200.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 189-200
-
-
Ehlert, S.1
Rebahi, Y.2
Magedanz, T.3
-
53
-
-
74049111426
-
Hash-AV: Fast virus signature scanning by cache-resident filters
-
Erdogan, O. and Cao, P. (2007) 'Hash-AV: fast virus signature scanning by cache-resident filters', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.50-59.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 50-59
-
-
Erdogan, O.1
Cao, P.2
-
54
-
-
77949415724
-
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
-
Finnigin, K.M., Mullins, B.E., Raines, R.A. and Potoczny, H.B. (2007) 'Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.260-271.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 260-271
-
-
Finnigin, K.M.1
Mullins, B.E.2
Raines, R.A.3
Potoczny, H.B.4
-
55
-
-
0038396531
-
An implantable antenna for communication with implantable medical devices
-
Orlando, FL, USA
-
Furse, C., Lai, H.K., Estes, C., Mahadik, A. and Duncan, A. (1999) 'An implantable antenna for communication with implantable medical devices', Proceedings of IEEE Antennas and Propagation/URSI International Symposium, Orlando, FL, USA.
-
(1999)
Proceedings of IEEE Antennas and Propagation/URSI International Symposium
-
-
Furse, C.1
Lai, H.K.2
Estes, C.3
Mahadik, A.4
Duncan, A.5
-
56
-
-
41249097456
-
A biocompatible antenna for communication with implantable medical devices
-
San Antonio, TX, USA
-
Furse, C., Mohan, R., Jakayar, A., Karidehal, S., McCleod, B. and Going, S. (2002) 'A biocompatible antenna for communication with implantable medical devices', Proceedings of the IEEE International Symposium on Antennas and Propagation, San Antonio, TX, USA.
-
(2002)
Proceedings of the IEEE International Symposium on Antennas and Propagation
-
-
Furse, C.1
Mohan, R.2
Jakayar, A.3
Karidehal, S.4
McCleod, B.5
Going, S.6
-
57
-
-
33846932583
-
Vital signs monitoring and patient tracking over a wireless network
-
1616352, Proceedings of the 2005 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEE-EMBS 2005
-
Gao, T., Greenspan, D., Welsh, M., Juang, R.R. and Alm, A. (2005, September) 'Vital signs monitoring and patient tracking over a wireless network', Proceedings of the 27th Annual International Conference of the IEEE EMBS, Shanghai, China, pp.102-105. (Pubitemid 46228803)
-
(2005)
Annual International Conference of the IEEE Engineering in Medicine and Biology - Proceedings
, vol.7
, pp. 102-105
-
-
Gao, T.1
Greenspan, D.2
Welsh, M.3
Juang, R.R.4
Alm, A.5
-
58
-
-
84905457377
-
Application for emergency medical services
-
May, Newark, NJ, USA
-
Gaynor, M., Messer, R., Myung, D. and Moulton, S. (2006, May) 'Application for emergency medical services', Proceedings of the 3rd International ISCRAM Conference, Newark, NJ, USA.
-
(2006)
Proceedings of the 3rd International ISCRAM Conference
-
-
Gaynor, M.1
Messer, R.2
Myung, D.3
Moulton, S.4
-
59
-
-
39749167413
-
Human computer interaction in the pre-hospital setting
-
3-6 January, Big Island, HI, USA
-
Gaynor, M., Myung, D., Patel, R. and Moulton, S. (2007) 'Human computer interaction in the pre-hospital setting', Proceedings of the 40th Annual Hawaii international Conference on System Sciences, 3-6 January, Big Island, HI, USA.
-
(2007)
Proceedings of the 40th Annual Hawaii International Conference on System Sciences
-
-
Gaynor, M.1
Myung, D.2
Patel, R.3
Moulton, S.4
-
60
-
-
85034657166
-
Design for wearability
-
19-20 October 1998, Pittsburgh, PA, USA
-
Gemperle, F., Kasabach, C., Stivoric, J., Bauer, M. and Martin, R. (1998) 'Design for wearability', Proceedings of the 2nd IEEE International Symposium on Wearable Computers, 19-20 October 1998, Pittsburgh, PA, USA, pp.116-122.
-
(1998)
Proceedings of the 2nd IEEE International Symposium on Wearable Computers
, pp. 116-122
-
-
Gemperle, F.1
Kasabach, C.2
Stivoric, J.3
Bauer, M.4
Martin, R.5
-
61
-
-
61849184822
-
Using audio in secure device pairing
-
Goodrich, M., Sirivianos, M., Solis, J., Soriente, C., Tsudik, G. and Uzun, E. (2009) 'Using audio in secure device pairing', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.57-68.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 57-68
-
-
Goodrich, M.1
Sirivianos, M.2
Solis, J.3
Soriente, C.4
Tsudik, G.5
Uzun, E.6
-
62
-
-
74549177130
-
Defence against packet injection in ad hoc networks
-
Gu, Q., Liu, P., Chu, C. and Zhu, S. (2007) 'Defence against packet injection in ad hoc networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.154-169.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 154-169
-
-
Gu, Q.1
Liu, P.2
Chu, C.3
Zhu, S.4
-
63
-
-
77949732329
-
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
-
Guo, H., Mu, Y., Zhang, X.Y. and Li, Z.J. (2010) 'Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.173-187.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 173-187
-
-
Guo, H.1
Mu, Y.2
Zhang, X.Y.3
Li, Z.J.4
-
64
-
-
78650656608
-
Detect DDoS flooding attacks in mobile ad hoc networks
-
Guo, Y. and Perreau, S. (2010) 'Detect DDoS flooding attacks in mobile ad hoc networks', International Journal of Security and Networks, Vol. 5, No. 4, pp.259-269.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 259-269
-
-
Guo, Y.1
Perreau, S.2
-
66
-
-
0033877788
-
Energy-efficient communication protocol for wireless microsensor networks
-
4-7 January IEEE Computer Society, Washington, DC, USA
-
Heinzelman, W.R., Chandrakasan, A. and Balakrishnan, H. (2000) 'Energy-efficient communication protocol for wireless microsensor networks', Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8, 4-7 January, IEEE Computer Society, Washington, DC, USA, pp.3005-3014.
-
(2000)
Proceedings of the 33rd Hawaii International Conference on System Sciences
, vol.8
, pp. 3005-3014
-
-
Heinzelman, W.R.1
Chandrakasan, A.2
Balakrishnan, H.3
-
67
-
-
70449621009
-
Enabling location-aware pervasive computing applications for the elderly
-
23-26 March, PERCOM, IEEE Computer Society, Washington, DC
-
Helal, S., Winkler, B., Lee, C., Kaddoura, Y., Ran, L., Giraldo, C., Kuchibhotla, S. and Mann, W. (2003) 'Enabling location-aware pervasive computing applications for the elderly', Proceedings of 1st IEEE International Conference on Pervasive Computing and Communication, 23-26 March, PERCOM, IEEE Computer Society, Washington, DC, pp.531-536.
-
(2003)
Proceedings of 1st IEEE International Conference on Pervasive Computing and Communication
, pp. 531-536
-
-
Helal, S.1
Winkler, B.2
Lee, C.3
Kaddoura, Y.4
Ran, L.5
Giraldo, C.6
Kuchibhotla, S.7
Mann, W.8
-
68
-
-
68149086398
-
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
-
Hoeper, K. and Gong, G. (2007) 'Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.239-250.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 239-250
-
-
Hoeper, K.1
Gong, G.2
-
69
-
-
77949844099
-
An efficient secure data dissemination scheme for grid structure wireless sensor networks
-
Hsiao, Y. and Hwang, R. (2010) 'An efficient secure data dissemination scheme for grid structure wireless sensor networks', International Journal of Security and Networks, Vol. 5, No. 1, pp.26-34.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 26-34
-
-
Hsiao, Y.1
Hwang, R.2
-
70
-
-
77953193668
-
NTP-DownloadT: A conformance test tool for secured mobile download services
-
Hsieh, C., Chen, J., Lin, Y-B., Chen, K., Liao, H. and Liang, C. (2008) 'NTP-DownloadT: a conformance test tool for secured mobile download services', International Journal of Security and Networks, Vol. 3, No. 4, pp.240-249.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 240-249
-
-
Hsieh, C.1
Chen, J.2
Lin, Y.-B.3
Chen, K.4
Liao, H.5
Liang, C.6
-
71
-
-
79951648076
-
LIP: A lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network
-
Hsu, H., Zhu, S. and Hurson, A.R. (2007) 'LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.202-215.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 202-215
-
-
Hsu, H.1
Zhu, S.2
Hurson, A.R.3
-
72
-
-
2342532327
-
QoS considerations in wireless sensor networks for telemedicine
-
Orlando, FL, USA
-
Hu, F. and Kumar, S. (2003) 'QoS considerations in wireless sensor networks for telemedicine', Proceedings of SPIE ITCOM Conference, Orlando, FL, USA.
-
(2003)
Proceedings of SPIE ITCOM Conference
-
-
Hu, F.1
Kumar, S.2
-
73
-
-
59549091540
-
Error-resistant RFIDassisted wireless sensor networks for cardiac telehealthcare
-
Hu, F., Celentano, L. and Xiao, Y. (2009a) 'Error-resistant RFIDassisted wireless sensor networks for cardiac telehealthcare', Wireless Communications and Mobile Computing (WCMC) Journal, Vol. 9, No. 1, pp.85-101.
-
(2009)
Wireless Communications and Mobile Computing (WCMC) Journal
, vol.9
, Issue.1
, pp. 85-101
-
-
Hu, F.1
Celentano, L.2
Xiao, Y.3
-
74
-
-
70349968010
-
Attacks and countermeasures in multi-hop cognitive radio networks
-
Hu, F., Dong, D. and Xiao, Y. (2009b) 'Attacks and countermeasures in multi-hop cognitive radio networks', International Journal of Security and Networks, Vol. 4, No. 4, pp.263-271.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 263-271
-
-
Hu, F.1
Dong, D.2
Xiao, Y.3
-
75
-
-
44349157008
-
Low-cost wireless sensor networks for remote cardiac patients monitoring applications
-
DOI 10.1002/wcm.488
-
Hu, F., Jiang, M. and Xiao, Y. (2008a) 'Low-cost wireless sensor networks for remote cardiac patients monitoring applications', Wireless Communications and Mobile Computing, Vol. 8, No. 4, pp.513-529. (Pubitemid 351747464)
-
(2008)
Wireless Communications and Mobile Computing
, vol.8
, Issue.4
, pp. 513-529
-
-
Hu, F.1
Jiang, M.2
Xiao, Y.3
-
76
-
-
46449131007
-
Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining
-
Hu, F., Jiang, M., Celentano, L. and Xiao, Y. (2008b) 'Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining', Ad Hoc Network, Vol. 6, No. 7, pp.986-1012.
-
(2008)
Ad Hoc Network
, vol.6
, Issue.7
, pp. 986-1012
-
-
Hu, F.1
Jiang, M.2
Celentano, L.3
Xiao, Y.4
-
77
-
-
36348989550
-
Towards a secure, RFID/Sensor based tele-cardiology system
-
Hu, F., Kumar, S. and Xiao, Y. (2006a) 'Towards a secure, RFID/Sensor based tele-cardiology system', IEEE CCNC'07, 5 September, pp.732-736.
-
(2006)
IEEE CCNC'07, 5 September
, pp. 732-736
-
-
Hu, F.1
Kumar, S.2
Xiao, Y.3
-
78
-
-
79951662876
-
Towards a realistic testbed for wireless network reliability and security performance studies
-
DOI 10.1504/IJSN.2008.016203
-
Hu, F., Rughoonundon, A. and Celentano, L. (2008c) 'Towards a realistic testbed for wireless network reliability and security performance studies', International Journal of Security and Networks, Vol. 3, No. 1, pp.63-77. (Pubitemid 351546023)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 63-77
-
-
Hu, F.1
Rughoonundon, A.2
Celentano, L.3
-
79
-
-
33644638914
-
Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations
-
DOI 10.1109/TMC.2006.1599408
-
Hu, F., Wang, Y. and Wu, H. (2006b) 'Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations', IEEE Transactions on Mobile Computing, Vol. 5, No. 4, pp.404-417. (Pubitemid 43327126)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.4
, pp. 404-417
-
-
Hu, F.1
Wang, Y.2
Wu, H.3
-
80
-
-
67349280853
-
Congestion-aware, lossresilient bio-monitoring sensor networking for mobile health applications
-
Hu, F., Xiao, Y. and Hao, Q. (2009c) 'Congestion-aware, lossresilient bio-monitoring sensor networking for mobile health applications', IEEE Journal on Selected Areas in Communications, Special Issue on Wireless and Pervasive Communications for Healthcare, Vol. 27, No. 4, pp.450-465.
-
(2009)
IEEE Journal on Selected Areas in Communications, Special Issue on Wireless and Pervasive Communications for Healthcare
, vol.27
, Issue.4
, pp. 450-465
-
-
Hu, F.1
Xiao, Y.2
Hao, Q.3
-
81
-
-
66249092571
-
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
-
Huang, D. (2007) 'Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.272-283.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 272-283
-
-
Huang, D.1
-
82
-
-
70349968221
-
Handling inheritance violation for secure interoperation of heterogeneous systems
-
Huang, H., Kirchner, H., Liu, S. and Wu, W. (2009) 'Handling inheritance violation for secure interoperation of heterogeneous systems', International Journal of Security and Networks, Vol. 4, No. 4, pp.223-233.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 223-233
-
-
Huang, H.1
Kirchner, H.2
Liu, S.3
Wu, W.4
-
83
-
-
77949801623
-
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
-
Huang, S. and Shieh, S. (2010) 'Authentication and secret search mechanisms for RFID-aware wireless sensor networks', International Journal of Security and Networks, Vol. 5, No. 1, pp.15-25.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 15-25
-
-
Huang, S.1
Shieh, S.2
-
84
-
-
0037774678
-
Implementation of a WAPbased telemedicine system for patient monitoring
-
Hung, K. and Zhang, Y.T. (2003) 'Implementation of a WAPbased telemedicine system for patient monitoring', IEEE Transactions on Information Technology in Biomedicine, Vol. 7, No. 2, pp.101-107.
-
(2003)
IEEE Transactions on Information Technology in Biomedicine
, vol.7
, Issue.2
, pp. 101-107
-
-
Hung, K.1
Zhang, Y.T.2
-
85
-
-
77949765115
-
On the security of RFID devices against implementation attacks
-
Hutter, M., Plos, T. and Feldhofer, M. (2010) 'On the security of RFID devices against implementation attacks', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.106-118.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 106-118
-
-
Hutter, M.1
Plos, T.2
Feldhofer, M.3
-
87
-
-
77949759554
-
Secure and efficient data transmission in RFID sensor networks
-
Imasaki, Y., Zhang, Y. and Ji, Y. (2010) 'Secure and efficient data transmission in RFID sensor networks', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.119-127.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 119-127
-
-
Imasaki, Y.1
Zhang, Y.2
Ji, Y.3
-
89
-
-
10644233142
-
Guest editorial introduction to the special section on M-health: Beyond seamless mobility and global wireless health-care connectivity
-
Istepanian, R.S.H., Jovanov, E. and Zhang, Y.T. (2004) 'Guest editorial introduction to the special section on M-health: beyond seamless mobility and global wireless health-care connectivity', IEEE Transactions on Information Technology in Biomedicine, Vol. 8, No. 4, pp.405-414.
-
(2004)
IEEE Transactions on Information Technology in Biomedicine
, vol.8
, Issue.4
, pp. 405-414
-
-
Istepanian, R.S.H.1
Jovanov, E.2
Zhang, Y.T.3
-
90
-
-
0742290133
-
An introduction to biometric recognition
-
Jain, A., Ross, A. and Prabhakar, S. (2004) 'An introduction to biometric recognition', IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14, No. 1, pp.4-20.
-
(2004)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.14
, Issue.1
, pp. 4-20
-
-
Jain, A.1
Ross, A.2
Prabhakar, S.3
-
91
-
-
70350626531
-
An ambient assisted living system for telemedicine with detection of symptoms
-
Lecture Note in Computer Science Springer
-
Jara, A.J., Zamora-Izquierdo, M.A. and Gomez-Skarmeta, A.F. (2009) 'An ambient assisted living system for telemedicine with detection of symptoms', Bioinspired Applications in Artificial and Natural Computation, Lecture Note in Computer Science, Springer, Vol. 5602, pp.75-84.
-
(2009)
Bioinspired Applications in Artificial and Natural Computation
, vol.5602
, pp. 75-84
-
-
Jara, A.J.1
Zamora-Izquierdo, M.A.2
Gomez-Skarmeta, A.F.3
-
92
-
-
18244373181
-
A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation
-
Jovanov, E., Milenkovic, A., Otto, C. and de Goroen, P.C. (2005) 'A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation', Journal of NeuroEngineering and Rehabilitation, Vol. 2, No. 6.
-
(2005)
Journal of NeuroEngineering and Rehabilitation
, vol.2
, Issue.6
-
-
Jovanov, E.1
Milenkovic, A.2
Otto, C.3
De Goroen, P.C.4
-
93
-
-
79954597540
-
Privacy protection system and metrics for hiding electrical events
-
Kalogridis, G., Denic, S.Z., Lewis, T. and Cepeda, R. (2011) 'Privacy protection system and metrics for hiding electrical events', International Journal of Security and Networks, Vol. 6, No. 1, pp.14-27.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 14-27
-
-
Kalogridis, G.1
Denic, S.Z.2
Lewis, T.3
Cepeda, R.4
-
94
-
-
79551651366
-
Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
-
Kandikattu, R. and Jacob, L. (2008) 'Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks', International Journal of Security and Networks, Vol. 3, No. 4, pp.258-274.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 258-274
-
-
Kandikattu, R.1
Jacob, L.2
-
95
-
-
70149104596
-
Forensic analysis of SCADA systems and networks
-
DOI 10.1504/IJSN.2008.017222
-
Kilpatrick, T., Gonzalez, J., Chandia, R., Papa, M. and Shenoi, S. (2008) 'Forensic analysis of SCADA systems and networks', International Journal of Security and Networks, Vol. 3, No. 2, pp.95-102. (Pubitemid 351292178)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 95-102
-
-
Kilpatrick, T.1
Gonzalez, J.2
Chandia, R.3
Papa, M.4
Shenoi, S.5
-
96
-
-
34547148771
-
Single packet IP traceback in AS-level partial deployment scenario
-
Korkmaz, T., Gong, C., Sarac, K. and Dykes, S. (2007) 'Single packet IP traceback in AS-level partial deployment scenario', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.95-108.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 95-108
-
-
Korkmaz, T.1
Gong, C.2
Sarac, K.3
Dykes, S.4
-
97
-
-
73549097586
-
Multilayer key establishment for large-scale sensor networks
-
DOI 10.1504/IJSN.2008.016197
-
Kotzanikolaou, P., Vergados, D.D., Stergiou, G. and Magkos, E. (2008) 'Multilayer key establishment for large-scale sensor networks', International Journal of Security and Networks, Vol. 3, No. 1, pp.1-9. (Pubitemid 351546017)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 1-9
-
-
Kotzanikolaou, P.1
Vergados, D.D.2
Stergiou, G.3
Magkos, E.4
-
98
-
-
0033458126
-
Efficiency analysis of a multi-specialty telemedicine service
-
DOI 10.1089/107830299312014
-
Krupinski, E.A., Webster, P., Dolliver, M., Weinstein, R.S. and Lopez, A.M. (1999) 'Efficiency analysis of a multi-specialty telemedicine service', Telemedicine Journal, Vol. 5, No. 3, pp.265-271. (Pubitemid 30012301)
-
(1999)
Telemedicine Journal
, vol.5
, Issue.3
, pp. 265-271
-
-
Krupinski, E.1
Webster, P.2
Dolliver, M.3
Weinstein, R.S.4
Lopez, A.M.5
-
99
-
-
79954619874
-
Towards modelling the impact of cyber attacks on a smart grid
-
Kundur, D., Feng, X., Mashayekh, S., Liu, S., Zourntos, T. and Butler-Purry, K.L. (2011) 'Towards modelling the impact of cyber attacks on a smart grid', International Journal of Security and Networks, Vol. 6, No. 1, pp.2-13.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 2-13
-
-
Kundur, D.1
Feng, X.2
Mashayekh, S.3
Liu, S.4
Zourntos, T.5
Butler-Purry, K.L.6
-
100
-
-
61849158147
-
Designing user studies for security applications: A case study with wireless network configuration
-
Kuo, C., Perrig, A. and Walker, J. (2009) 'Designing user studies for security applications: a case study with wireless network configuration', International Journal of Security and Networks, Vol. 409, Nos. 1/2, pp.101-109.
-
(2009)
International Journal of Security and Networks
, vol.409
, Issue.1-2
, pp. 101-109
-
-
Kuo, C.1
Perrig, A.2
Walker, J.3
-
101
-
-
14844346306
-
Telemedicine in emergency care
-
September, Patra, Greece
-
Kyriacou, E., Pavlopoulos, S., Bourka, A., Berler, A. and Koutsouris, D. (1999, September) 'Telemedicine in emergency care', Proceedings of the VI International Conference on Medical Physics, Patra, Greece, pp.293-298.
-
(1999)
Proceedings of the VI International Conference on Medical Physics
, pp. 293-298
-
-
Kyriacou, E.1
Pavlopoulos, S.2
Bourka, A.3
Berler, A.4
Koutsouris, D.5
-
102
-
-
0035782473
-
Multipurpose health care telemedicine system
-
Kyriacou, E., Pavlopoulos, S., Koutsouris, D., Andreou, A., Pattichis, C. and Schizas, C. (2001) 'Multipurpose health care telemedicine system', Proceedings of the 23rd Annual International Conference of the IEEE/EMBS, Istanbul, Turkey, pp.3544-3547. (Pubitemid 35389441)
-
(2001)
Annual Reports of the Research Reactor Institute, Kyoto University
, vol.4
, pp. 3544-3547
-
-
Kyriacou, E.1
Pavlopoulos, S.2
Koutsouris, D.3
Andreou, A.S.4
Pattichis, C.5
Schizas, C.6
-
103
-
-
10644277528
-
-
Masters of Engineering, Thesis, MIT, Cambridge, MA, USA
-
Lau, M. (1998) GeoPak: Monitoring Climbers and Climate on Mount Everest, Masters of Engineering Thesis, MIT, Cambridge, MA, USA.
-
(1998)
GeoPak: Monitoring Climbers and Climate on Mount Everest
-
-
Lau, M.1
-
104
-
-
61849166040
-
User-aided data authentication
-
Laur, S. and Pasini, S. (2009) 'User-aided data authentication', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.69-86.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 69-86
-
-
Laur, S.1
Pasini, S.2
-
105
-
-
68149158275
-
An efficient one-time password authentication scheme using a smart card
-
Lee, S. and Sivalingam, K.M. (2009) 'An efficient one-time password authentication scheme using a smart card', International Journal of Security and Networks, Vol. 4, No. 3, pp.145-152.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 145-152
-
-
Lee, S.1
Sivalingam, K.M.2
-
106
-
-
77949760270
-
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
-
Leng, X., Lien, Y., Mayes, K. and Markantonakis, K. (2010) 'An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.79-86.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 79-86
-
-
Leng, X.1
Lien, Y.2
Mayes, K.3
Markantonakis, K.4
-
107
-
-
79954614519
-
Secure and privacy-preserving information aggregation for smart grids
-
Li, F., Luo, B. and Liu, P. (2011) 'Secure and privacy-preserving information aggregation for smart grids', International Journal of Security and Networks, Vol. 6, No. 1, pp.28-39.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 28-39
-
-
Li, F.1
Luo, B.2
Liu, P.3
-
108
-
-
77954327354
-
PVFS: A probabilistic voting-based filtering scheme in wireless sensor networks
-
Li, F., Srinivasan, A. and Wu, J. (2008a) 'PVFS: a probabilistic voting-based filtering scheme in wireless sensor networks', International Journal of Security and Networks, Vol. 3, No. 3, pp.173-182.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 173-182
-
-
Li, F.1
Srinivasan, A.2
Wu, J.3
-
109
-
-
77952481544
-
ID-based threshold proxy signcryption scheme from bilinear pairings
-
Li, F., Xin, X. and Hu, Y. (2008b) 'ID-based threshold proxy signcryption scheme from bilinear pairings', International Journal of Security and Networks, Vol. 3, No. 3, pp.206-215.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 206-215
-
-
Li, F.1
Xin, X.2
Hu, Y.3
-
110
-
-
79551652560
-
DKMS: Distributed hierarchical access control for multimedia networks
-
Li, R., Li, J. and Chen, H. (2007) 'DKMS: distributed hierarchical access control for multimedia networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.3-10.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 3-10
-
-
Li, R.1
Li, J.2
Chen, H.3
-
111
-
-
51849141536
-
A novel localised authentication scheme in IEEE 802.11 based wireless mesh networks
-
DOI 10.1504/IJSN.2008.017225
-
Lin, X., Ling, X., Zhu, H., Ho, P. and Shen, X. (2008) 'A novel localised authentication scheme in IEEE 802.11 based wireless mesh networks', International Journal of Security and Networks, Vol. 3, No. 2, pp.122-132. (Pubitemid 351292181)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 122-132
-
-
Lin, X.1
Ling, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.S.5
-
112
-
-
79551646922
-
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
-
Ling, H. and Znati, T. (2007) 'End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.109-121.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 109-121
-
-
Ling, H.1
Znati, T.2
-
113
-
-
36348935486
-
A sensor network architecture for cardiac health monitoring
-
DOI 10.1109/CCNC.2007.150, 4199238, 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
-
Liszka, K.J. (2007, January) 'A sensor network architecture for cardiac health monitoring', The 4th IEEE Consumer Communications and Networking Conference (CCNC 2007), Las Vegas, NV, USA, pp.737-740. (Pubitemid 350141526)
-
(2007)
2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
, pp. 737-740
-
-
Liszka, K.J.1
-
114
-
-
10944231222
-
Keeping a beat on the heart
-
DOI 10.1109/MPRV.2004.10
-
Liszka, K.J., Macking, M.A., Lichter, M.J., York, D.W., Pillai, D. and Resenbaum, D.S. (2004a) 'Keeping a beat on the heart', IEEE Pervasive Computing, Vol. 3, No. 4, pp.42-49. (Pubitemid 40010897)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 42-49
-
-
Liszka, K.J.1
Mackin, M.A.2
Lichter, M.J.3
York, D.W.4
Pillai, D.5
Rosenbaum, D.S.6
-
115
-
-
12744252915
-
Remote monitoring of a heterogeneous sensor network for biomedical research in space
-
Proceedings of the International Conference on Wireless Networks, ICWN'04 - Proceedings of the International Conference on Pervasive Computing and Communications, PCC'04
-
Liszka, K.J., York, D.W., Mackin, M.A. and Lichter, M.J. (2004b, June) 'Remote monitoring of a heterogeneous sensor network for biomedical research in space', Proceedings of the International Conference on Pervasive Computing and Communications, CSREA Press, pp.829-833. (Pubitemid 40157334)
-
(2004)
Proceedings of the International Conference on Wireless Networks, ICWN'04
, vol.2
, pp. 829-833
-
-
Liszka, K.J.1
York, D.W.2
Rosenbaum, D.S.3
Mackint, M.A.4
Lichter, M.J.5
-
116
-
-
79551645150
-
An one-way function based framework for pairwise key establishment in sensor networks
-
Ma, L., Teymorian, A.Y., Xing, K. and Du, D. (2008) 'An one-way function based framework for pairwise key establishment in sensor networks', International Journal of Security and Networks, Vol. 3, No. 4, pp.217-225.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 217-225
-
-
Ma, L.1
Teymorian, A.Y.2
Xing, K.3
Du, D.4
-
117
-
-
79951647154
-
Verifying security protocols by knowledge analysis
-
Ma, X. and Cheng, X. (2008) 'Verifying security protocols by knowledge analysis', International Journal of Security and Networks, Vol. 3, No. 3, pp.183-192.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 183-192
-
-
Ma, X.1
Cheng, X.2
-
118
-
-
77949713025
-
Trust in RFID-enabled supply-chain management
-
Mahinderjit-Singh, M. and Li, X. (2010) 'Trust in RFID-enabled supply-chain management', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.96-105.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 96-105
-
-
Mahinderjit-Singh, M.1
Li, X.2
-
119
-
-
20544447851
-
CodeBlue: An ad hoc sensor network infrastructure for emergency medical care
-
April, London, UK
-
Malan, D., Fulford-Jones, T., Welsh, M. and Moulton, S. (2004, April) 'CodeBlue: an ad hoc sensor network infrastructure for emergency medical care', International Workshop on Wearable and Implantable Body Sensor Networks, London, UK.
-
(2004)
International Workshop on Wearable and Implantable Body Sensor Networks
-
-
Malan, D.1
Fulford-Jones, T.2
Welsh, M.3
Moulton, S.4
-
120
-
-
74549116861
-
Securing Wi-Fi networks with position verification: Extended version
-
Malaney, R. (2007) 'Securing Wi-Fi networks with position verification: extended version', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.27-36.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 27-36
-
-
Malaney, R.1
-
121
-
-
77949837905
-
A backpressure technique for filtering spoofed traffic at upstream routers
-
Malliga, S. and Tamilarasi, A. (2010) 'A backpressure technique for filtering spoofed traffic at upstream routers', International Journal of Security and Networks, Vol. 5, No. 1, pp.3-14.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 3-14
-
-
Malliga, S.1
Tamilarasi, A.2
-
123
-
-
2342539792
-
Accelerometry: Providing an integrated, practical method for long-term, ambulatory monitoring of human movement
-
April
-
Mathie, M., Coster, A., Lovell, N. and Celler, B. (2004, April) 'Accelerometry: providing an integrated, practical method for long-term, ambulatory monitoring of human movement', Physiological Measurement, Vol. 25, No. 2.
-
(2004)
Physiological Measurement
, vol.25
, Issue.2
-
-
Mathie, M.1
Coster, A.2
Lovell, N.3
Celler, B.4
-
124
-
-
79951631723
-
Foreword
-
Mayrhofer, R., Nyberg, K. and Kindberg, T. (2009) 'Foreword', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.1-3.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 1-3
-
-
Mayrhofer, R.1
Nyberg, K.2
Kindberg, T.3
-
125
-
-
61849133288
-
Seeing-is-believing: Using camera phones for human-verifiable authentication
-
McCune, J., Perrig, A. and Reiter, M. (2009) 'Seeing-is-believing: using camera phones for human-verifiable authentication', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.43-56.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 43-56
-
-
McCune, J.1
Perrig, A.2
Reiter, M.3
-
126
-
-
79951606986
-
Editorial
-
Memon, N. and Goel, R. (2008) 'Editorial', International Journal of Security and Networks, Vol. 3, No. 2, p.79.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 79
-
-
Memon, N.1
Goel, R.2
-
128
-
-
79951645452
-
Server side hashing core exceeding 3 Gbps of throughput
-
Michail, H.E., Panagiotakopoulos, G.A., Thanasoulis, V.N., Kakarountas, A.P. and Goutis, C.E. (2007) 'Server side hashing core exceeding 3 Gbps of throughput', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.228-238.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 228-238
-
-
Michail, H.E.1
Panagiotakopoulos, G.A.2
Thanasoulis, V.N.3
Kakarountas, A.P.4
Goutis, C.E.5
-
129
-
-
33746764996
-
Wireless sensor networks for personal health monitoring: Issues and an implementation
-
DOI 10.1016/j.comcom.2006.02.011, PII S0140366406000508
-
Milenković, A., Otto, C. and Jovanov, E. (2006) 'Wireless sensor networks for personal health monitoring: issues and an implementation', Computer Communications, Vol. 29, Nos. 13/14, pp.2521-2533. (Pubitemid 44162982)
-
(2006)
Computer Communications
, vol.29
, Issue.13-14
, pp. 2521-2533
-
-
Milenkovic, A.1
Otto, C.2
Jovanov, E.3
-
130
-
-
36348983213
-
On security attacks in healthcare WSNs implemented on 802.15.4 beacon enabled clusters
-
DOI 10.1109/CCNC.2007.151, 4199239, 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
-
Mišić, J., Amini, F. and Khan, M. (2007, January.) 'On security attacks in healthcare WSNs implemented on 802.15.4 beacon enabled clusters', The 4th IEEE Conference on Consumer Communications and Networking (CCNC 2007), Las Vegas, NV, USA, pp.741-745. (Pubitemid 350141527)
-
(2007)
2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
, pp. 741-745
-
-
Misic, J.1
Amini, F.2
Khan, M.3
-
131
-
-
33750030809
-
Implementation of security policy for clinical information systems over wireless sensor networks
-
DOI 10.1016/j.adhoc.2006.05.008, PII S1570870506000461, Security Issues in Sensor and Ad Hoc Networks
-
Mišić, J. and Mišić, V.B. (2007) 'Implementation of security policy for clinical information systems over wireless sensor networks', Ad Hoc Networks, Vol. 5, No. 1, pp.134-144. (Pubitemid 44573004)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 134-144
-
-
Misic, J.1
Misic, V.B.2
-
132
-
-
79951639076
-
Editorial
-
Mu, Y., Chen, L., Chen, X., Gong, G., Lee, P., Miyaji, A., Pieprzyk, J., Pointcheval, D., Takagi, T., Traore, J., Seberry, J., Susilo, W., Wang, H. and Zhang, F. (2007) 'Editorial', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.171-174.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 171-174
-
-
Mu, Y.1
Chen, L.2
Chen, X.3
Gong, G.4
Lee, P.5
Miyaji, A.6
Pieprzyk, J.7
Pointcheval, D.8
Takagi, T.9
Traore, J.10
Seberry, J.11
Susilo, W.12
Wang, H.13
Zhang, F.14
-
133
-
-
0033888723
-
Home RF: Wireless networking for the connected home
-
Negus, K.J., Stephens, A.P. and Lansford, J. (2000) 'Home RF: wireless networking for the connected home', IEEE Personal Communications, Vol. 7, No. 1, pp.20-27.
-
(2000)
IEEE Personal Communications
, vol.7
, Issue.1
, pp. 20-27
-
-
Negus, K.J.1
Stephens, A.P.2
Lansford, J.3
-
134
-
-
71649087488
-
Using PLSI-U to detect insider threats by datamining e-mail
-
DOI 10.1504/IJSN.2008.017224
-
Okolica, J.S., Peterson, G.L. and Mills, R.F. (2008) 'Using PLSI-U to detect insider threats by datamining e-mail', International Journal of Security and Networks, Vol. 3, No. 2, pp.114-121. (Pubitemid 351292180)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 114-121
-
-
Okolica, J.L.1
Peterson, G.L.2
Mills, R.F.3
-
135
-
-
34548042117
-
On the design of secure protocols for hierarchical sensor networks'
-
Oliveira, L.B., Wong, H., Loureiro, A.A.F. and Dahab, R. (2007) 'On the design of secure protocols for hierarchical sensor networks', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.216-227.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 216-227
-
-
Oliveira, L.B.1
Wong, H.2
Loureiro, A.A.F.3
Dahab, R.4
-
136
-
-
74549175881
-
Security overhead and performance for aggregation with fragment retransmission (AFR) in very highspeed wireless 802.11 LANs
-
Olteanu, A. and Xiao, Y. (2010) 'Security overhead and performance for aggregation with fragment retransmission (AFR) in very highspeed wireless 802.11 LANs', IEEE Transactions on Wireless Communications, Vol. 9, No. 1, pp.218-226.
-
(2010)
IEEE Transactions on Wireless Communications
, vol.9
, Issue.1
, pp. 218-226
-
-
Olteanu, A.1
Xiao, Y.2
-
137
-
-
0033001284
-
Need for a revision of the normal limits of resting heart rate
-
Palatini, P. (1999) 'Need for a revision of the normal limits of resting heart rate', Hypertension, Vol. 33, No. 2, pp.622-625. (Pubitemid 29091637)
-
(1999)
Hypertension
, vol.33
, Issue.2
, pp. 622-625
-
-
Palatini, P.1
-
138
-
-
79551647519
-
Vulnerabilities in distanceindexed IP traceback schemes
-
Pan, J., Cai, L. and Shen, X. (2007) 'Vulnerabilities in distanceindexed IP traceback schemes', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.81-94.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 81-94
-
-
Pan, J.1
Cai, L.2
Shen, X.3
-
139
-
-
0021892137
-
A real-time QRS detection algorithm
-
Pan, J. and Tompkins, W.J. (1985) 'A real-time QRS detection algorithm', IEEE Transactions on Biomedical Engineering, Vol. 32, No. 3, pp.230-236. (Pubitemid 15148852)
-
(1985)
IEEE Transactions on Biomedical Engineering
, vol.32
, Issue.3
, pp. 230-236
-
-
Pan, J.1
Tompkins, W.J.2
-
140
-
-
0036543760
-
Wireless telemedicine systems: An overview
-
DOI 10.1109/MAP.2002.1003651
-
Pattichis, C.S., Kyriacou, E., Voskarides, S., Pattichis, M.S., Istepanian, R. and Shizas, C.N. (2002) 'Wireless telemedicine systems: an overview', IEEE Antennas & Propagation Magazine, Vol. 44, No. 2, pp.143-153. (Pubitemid 34711456)
-
(2002)
IEEE Antennas and Propagation Magazine
, vol.44
, Issue.2
, pp. 143-153
-
-
Pattichis, C.S.1
Kyriacou, E.2
Voskarides, S.3
Pattichis, M.S.4
Istepanian, R.5
Schizas, C.N.6
-
141
-
-
0032216444
-
A novel emergency telemedicine system based on wireless communication technology - ambulance
-
PII S1089777198085513
-
Pavlopoulos, S., Kyriacou, E., Berler, A., Dembeyiotis, S. and Koutsouris, D. (1998) 'A novel emergency telemedicine system based on wireless communication technology -AMBULANCE', IEEE Transactions On Informatics Technology Biomedicine, Vol. 2, No. 4, pp.261-267. (Pubitemid 128748396)
-
(1998)
IEEE Transactions on Information Technology in Biomedicine
, vol.2
, Issue.4
, pp. 261-267
-
-
Pavlopoulos, S.1
Kyriacou, E.2
Berler, A.3
Dembeyiotis, S.4
Koutsouris, D.5
-
142
-
-
12744251529
-
Embedded web technology: Applying world wide web standards to embedded systems
-
March, AIAA- 2001-5107
-
Ponyik, J.G. and York, D.W. (2002, March) 'Embedded web technology: applying world wide web standards to embedded systems', NASA TM-2002-211199, AIAA-2001-5107.
-
(2002)
NASA TM-2002-211199
-
-
Ponyik, J.G.1
York, D.W.2
-
143
-
-
33846906776
-
Cuff-less and noninvasive measurements of arterial blood pressure by pulse transit time
-
1615827, Proceedings of the 2005 27th Annual International Conference of the Engineering in Medicine and Biology Society, IEEE-EMBS 2005
-
Poon, C.C.Y. and Zhang, Y. (2005, September) 'Cuff-less and noninvasive measurements of arterial blood pressure by pulse transit time', Proceedings of 27th IEEE International Conference of Engineering in Medicine and Biology Society, Shanghai, China, pp.5877-5880. (Pubitemid 46230299)
-
(2005)
Annual International Conference of the IEEE Engineering in Medicine and Biology - Proceedings
, vol.7
, pp. 5877-5880
-
-
Poon, C.C.Y.1
Zhang, Y.T.2
-
144
-
-
33646948221
-
A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-health
-
DOI 10.1109/MCOM.2006.1632652
-
Poon, C.C.Y., Zhang, Y. and Bao, S. (2006) 'A novel biometrics method to secure wireless body area sensor networks for telemedicine and M-Health', IEEE Communications Magazine, Vol. 44, No. 4, pp.73-81. (Pubitemid 43792671)
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 73-81
-
-
Poon, C.C.Y.1
Zhang, Y.-T.2
Bao, S.-D.3
-
145
-
-
0037632482
-
Towards a propagation model for wireless biomedical applications
-
Prakash, Y., Lalwani, S., Gupta, S.K.S., Elsharawy, E. and Schwiebert, L. (2003) 'Towards a propagation model for wireless biomedical applications', IEEE ICC 2003, Vol. 3, pp.1993-1997.
-
(2003)
IEEE ICC 2003
, vol.3
, pp. 1993-1997
-
-
Prakash, Y.1
Lalwani, S.2
Gupta, S.K.S.3
Elsharawy, E.4
Schwiebert, L.5
-
147
-
-
77949750049
-
A ubiquitous mobile telemedicine system for the elderly using RFID
-
Raad, M. (2010) 'A ubiquitous mobile telemedicine system for the elderly using RFID', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.156-164.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 156-164
-
-
Raad, M.1
-
148
-
-
79551643767
-
Secure message delivery in publish/subscribe networks using overlay multicast
-
Rabinovich, P. and Simon, R. (2007) 'Secure message delivery in publish/subscribe networks using overlay multicast', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.60-70.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 60-70
-
-
Rabinovich, P.1
Simon, R.2
-
149
-
-
79954594099
-
Subjective audio quality over a secure IEEE 802.11n network
-
Ramsey, B.W., Mullins, B.E., Thomas, R.W. and Andel, T.R. (2011) 'Subjective audio quality over a secure IEEE 802.11n network', International Journal of Security and Networks, Vol. 6, No. 1, pp.53-63.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 53-63
-
-
Ramsey, B.W.1
Mullins, B.E.2
Thomas, R.W.3
Andel, T.R.4
-
150
-
-
77953435941
-
Delivering diagnostic quality video over mobile wireless network for telemedicine
-
Rao, S.P., Jayant, N.S., Stachura, M.E., Astapova, E. and Pearson-Shaver, A. (2009) 'Delivering diagnostic quality video over mobile wireless network for telemedicine', International Journal of Telemedicine and Applications, Vol. 2009, pp.1-9.
-
(2009)
International Journal of Telemedicine and Applications
, vol.2009
, pp. 1-9
-
-
Rao, S.P.1
Jayant, N.S.2
Stachura, M.E.3
Astapova, E.4
Pearson-Shaver, A.5
-
151
-
-
77955714466
-
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
-
Ray, I. and Poolsappasit, N. (2008) 'Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents', International Journal of Security and Networks, Vol. 3, No. 2, pp.80-94.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.2
, pp. 80-94
-
-
Ray, I.1
Poolsappasit, N.2
-
152
-
-
70349949111
-
Visibility: A novel concept for characterising provable network digital evidences
-
Rekhis, S. and Boudriga, N.A. (2009) 'Visibility: a novel concept for characterising provable network digital evidences', International Journal of Security and Networks, Vol. 4, No. 4, pp.234-245.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.4
, pp. 234-245
-
-
Rekhis, S.1
Boudriga, N.A.2
-
153
-
-
77949752019
-
Security assessments of IEEE 802.15.4 standard based on X.805 framework
-
Richard, A.O., Ahmad, A. and Kiseon, K. (2010) 'Security assessments of IEEE 802.15.4 standard based on X.805 framework', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.188-197.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 188-197
-
-
Richard, A.O.1
Ahmad, A.2
Kiseon, K.3
-
154
-
-
77949666177
-
Perceived barriers to the widespread commercial use of radio frequency identification technology
-
Rodrigues, M.J. and James, K. (2010) 'Perceived barriers to the widespread commercial use of radio frequency identification technology', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.165-172.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 165-172
-
-
Rodrigues, M.J.1
James, K.2
-
155
-
-
0029909539
-
Predicting sudden cardiac death from T wave alternans of the surface electrocardiogram: Promise and pitfalls
-
Rosenbaum, D.S., Albrecht, P. and Cohen, R.J. (1996) 'Predicting sudden cardiac death from microvolt T-wave alternans of the surface electrocardiogram: promise and pitfalls', Journal of Cardiovascular Electrophysiology, Vol. 7, pp.1095-1111. (Pubitemid 26389425)
-
(1996)
Journal of Cardiovascular Electrophysiology
, vol.7
, Issue.11
, pp. 1095-1111
-
-
Rosenbaum, D.S.1
Albrecht, P.2
Cohen, R.J.3
-
156
-
-
0028069574
-
Electrical alternans and vulnerability to ventricular arrhythmias
-
DOI 10.1056/NEJM199401273300402
-
Rosenbaum, D.S., Jackson, L.E., Smith, J.M., Garan, H., Ruskin, J.N. and Cohen, R.J. (1994) 'Electrical alternans and vulnerability to ventricular arrhythmias', New England Journal of Medicine, Vol. 330, pp.235-241. (Pubitemid 24034135)
-
(1994)
New England Journal of Medicine
, vol.330
, Issue.4
, pp. 235-241
-
-
Rosenbaum, D.S.1
Jackson, L.E.2
Smith, J.M.3
Garan, H.4
Ruskin, J.N.5
Cohen, R.J.6
-
157
-
-
57349142855
-
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
-
Middleware 2001
-
Rowstron, A. and Druschel P. (2001) 'Pastry: scalable, distributed object location and routing for large-scale peer-to-peer systems', Proceedings of 4th IFIP/ACM International Conferences on Distributed Systems Platforms, ACM Press, pp.329-350. (Pubitemid 33362020)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2218
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
158
-
-
79551624528
-
An iris and retina multimodal biometric system
-
Sadowitz, M., Latifi, S. and Walker, D. (2008) 'An iris and retina multimodal biometric system', International Journal of Security and Networks, Vol. 3, No. 4, pp.250-257.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 250-257
-
-
Sadowitz, M.1
Latifi, S.2
Walker, D.3
-
159
-
-
42649122222
-
Adaptive trust-based anonymous network
-
Sakarindr, P. and Ansari, N. (2007) 'Adaptive trust-based anonymous network', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.11-26.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 11-26
-
-
Sakarindr, P.1
Ansari, N.2
-
160
-
-
61849163799
-
Proximity-based authentication of mobile devices
-
Scannell, A., Varshavsky, A., LaMarca, A. and Lara, E.D. (2009) 'Proximity-based authentication of mobile devices', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.4-16.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 4-16
-
-
Scannell, A.1
Varshavsky, A.2
Lamarca, A.3
Lara, E.D.4
-
161
-
-
85086420396
-
Syntax vs. semantics: Competing approaches to dynamic network intrusion detection
-
DOI 10.1504/IJSN.2008.016199
-
Scheirer, W. and Chuah, M. (2008) 'Syntax vs. semantics: competing approaches to dynamic network intrusion detection', International Journal of Security and Networks, Vol. 3, No. 1, pp.24-35. (Pubitemid 351546019)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 24-35
-
-
Scheirer, W.1
Chuah, M.C.2
-
162
-
-
78650637965
-
An FPGA-based system for tracking digital information transmitted via peer-to-peer protocols
-
Schrader, K.R., Mullins, B.E., Peterson, G.L. and Mills, R.F. (2010) 'An FPGA-based system for tracking digital information transmitted via peer-to-peer protocols', International Journal of Security and Networks, Vol. 5, No. 4, pp.236-247.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 236-247
-
-
Schrader, K.R.1
Mullins, B.E.2
Peterson, G.L.3
Mills, R.F.4
-
164
-
-
80053583076
-
A biomedical smart sensor for the visually impaired
-
11-14 June, Orlando, FL, USA
-
Schwiebert, L., Gupta, S.K.S., Auner, P.S.G., Abrams, G., Lezzi, R. and McAllister, P. (2002) 'A biomedical smart sensor for the visually impaired', 1st IEEE International Conference on Sensors, 11-14 June, Orlando, FL, USA.
-
(2002)
1st IEEE International Conference on Sensors
-
-
Schwiebert, L.1
Gupta, S.K.S.2
Auner, P.S.G.3
Abrams, G.4
Lezzi, R.5
McAllister, P.6
-
166
-
-
0035197096
-
Energy-efficient protocols for wireless communication in biosensor networks
-
September
-
Shankar, V., Natarajan, A., Gupta, S.K.S. and Schwiebert, L. (2001, September) 'Energy-efficient protocols for wireless communication in biosensor networks', 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Vol. 1, pp.114-118.
-
(2001)
12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications
, vol.1
, pp. 114-118
-
-
Shankar, V.1
Natarajan, A.2
Gupta, S.K.S.3
Schwiebert, L.4
-
167
-
-
51349129063
-
Sensor networks for medical care
-
2-4 November, San Diego, USA
-
Shnayder, V., Chen, B., Lorincz, K., Jones, T.R. and Welsh, M. (2005) 'Sensor networks for medical care', Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, 2-4 November, San Diego, USA.
-
(2005)
Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems
-
-
Shnayder, V.1
Chen, B.2
Lorincz, K.3
Jones, T.R.4
Welsh, M.5
-
168
-
-
61849147296
-
Secure pairing of interface constrained devices
-
Soriente, C., Tsudik, G. and Uzun, E. (2009) 'Secure pairing of interface constrained devices', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.17-26.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 17-26
-
-
Soriente, C.1
Tsudik, G.2
Uzun, E.3
-
169
-
-
79551628267
-
Clique-based group key assignment in wireless sensor networks
-
Srinivasan, A., Li, F., Wu, J. and Li, M. (2008) 'Clique-based group key assignment in wireless sensor networks', International Journal of Security and Networks, Vol. 3, No. 4, pp.226-239.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.4
, pp. 226-239
-
-
Srinivasan, A.1
Li, F.2
Wu, J.3
Li, M.4
-
171
-
-
67349148529
-
Novel methods of faster cardiovascular diagnosis in wireless telecardiology
-
Sufi, F., Fang, Q., Khalil, I. and Mahmoud, S.S. (2009) 'Novel methods of faster cardiovascular diagnosis in wireless telecardiology', IEEE Journal on Selected Areas in Communications, Special Issue on Wireless and Pervasive Communications for Healthcare, Vol. 27, No. 4, pp.537-552.
-
(2009)
IEEE Journal on Selected Areas in Communications, Special Issue on Wireless and Pervasive Communications for Healthcare
, vol.27
, Issue.4
, pp. 537-552
-
-
Sufi, F.1
Fang, Q.2
Khalil, I.3
Mahmoud, S.S.4
-
172
-
-
74549171036
-
On pairwise connectivity of wireless multihop networks
-
Sun, F. and Shayman, M. (2007) 'On pairwise connectivity of wireless multihop networks', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.37-49.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 37-49
-
-
Sun, F.1
Shayman, M.2
-
173
-
-
77949694146
-
Security and privacy on low-cost radio frequency identification systems
-
Sun, L. (2010) 'Security and privacy on low-cost radio frequency identification systems', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.128-134.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 128-134
-
-
Sun, L.1
-
174
-
-
61849117271
-
Standards for security associations in personal networks: A comparative analysis
-
Suomalainen, J., Valkonen, J. and Asokan, N. (2009) 'Standards for security associations in personal networks: a comparative analysis', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.87-100.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 87-100
-
-
Suomalainen, J.1
Valkonen, J.2
Asokan, N.3
-
175
-
-
41249093486
-
Temperature aware routing for telemedicine applications in embedded biomedical sensor networks
-
Takahashi, D., Xiao, Y., Hu, F., Chen, J. and Sun, Y. (2008) 'Temperature aware routing for telemedicine applications in embedded biomedical sensor networks', EURASIP Journal on Wireless Communications and Networking, Special Issue on "Wireless Telemedicine and Applications", Vol. 2008, No. 2, 11p.
-
(2008)
EURASIP Journal on Wireless Communications and Networking, Special Issue on "Wireless Telemedicine and Applications"
, vol.2008
, Issue.2
, pp. 11
-
-
Takahashi, D.1
Xiao, Y.2
Hu, F.3
Chen, J.4
Sun, Y.5
-
176
-
-
67349268406
-
ANGELAH: A framework for assisting elders at home
-
Taleb, T., Bottazzi, D., Guizani, M. and Nait-Charif, H. (2009) 'ANGELAH: a framework for assisting elders at home', IEEE Journal on Selected Areas in Communications, Special Issue on Wireless and Pervasive Communications for Healthcare, Vol. 27, No. 4, pp.480-494.
-
(2009)
IEEE Journal on Selected Areas in Communications, Special Issue on Wireless and Pervasive Communications for Healthcare
, vol.27
, Issue.4
, pp. 480-494
-
-
Taleb, T.1
Bottazzi, D.2
Guizani, M.3
Nait-Charif, H.4
-
177
-
-
26444490086
-
TARA: Thermal-Aware Routing Algorithm for implanted sensor networks
-
Distributed Computing in Sensor Systems: First IEEE International Conference, DCOSS 2005. Proceedings
-
Tang, Q., Tummala, N., Gupta, S.K.S. and Schwiebert, L. (2005) 'TARA: thermal-aware routing algorithm for implanted sensor networks', Proceedings of the International Conference on Distributed Computing in Sensor Systems, pp.206-217. (Pubitemid 41425118)
-
(2005)
Lecture Notes in Computer Science
, vol.3560
, pp. 206-217
-
-
Tang, Q.1
Tummala, N.2
Gupta, S.K.S.3
Schwiebert, L.4
-
178
-
-
85016433011
-
Efficient multicast stream authentication for the fully adversarial network model
-
Tartary, C. and Wang, H. (2007) 'Efficient multicast stream authentication for the fully adversarial network model', International Journal of Security and Networks, Vol. 2, Nos. 3/4, pp.175-191.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.3-4
, pp. 175-191
-
-
Tartary, C.1
Wang, H.2
-
179
-
-
33745210232
-
-
Wiley, Hoboken, NJ
-
Te'eni, D., Carey, J. and Zhang, P. (2007) Human Computer Interaction: Developing Effective Organizational Information Systems, Wiley, Hoboken, NJ.
-
(2007)
Human Computer Interaction: Developing Effective Organizational Information Systems
-
-
Te'eni, D.1
Carey, J.2
Zhang, P.3
-
180
-
-
79951661564
-
Secure user-identification and key distribution scheme preserving anonymity
-
Tripathy, S. and Nandi, S. (2008) 'Secure user-identification and key distribution scheme preserving anonymity', International Journal of Security and Networks, Vol. 3, No. 3, pp.201-205.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 201-205
-
-
Tripathy, S.1
Nandi, S.2
-
181
-
-
77949817850
-
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
-
Tsai, K., Hsu, C. and Wu, T. (2010) 'Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks', International Journal of Security and Networks, Vol. 5, No. 1, pp.45-52.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 45-52
-
-
Tsai, K.1
Hsu, C.2
Wu, T.3
-
182
-
-
0034241931
-
Physiology of a microgravity environment invited review: What do we know about the effects of spaceflight on bone?
-
Turner, R.T. (2000, August) 'Physiology of a microgravity environment: invited review: what do we know about the effects of spaceflight on bone?', Journal of Applied Physiology, Vol. 89, pp.840-847. (Pubitemid 30637135)
-
(2000)
Journal of Applied Physiology
, vol.89
, Issue.2
, pp. 840-847
-
-
Turner, R.T.1
-
183
-
-
0004035658
-
-
United Nations Population Division, accessed on 13 October 2010
-
United Nations Population Division (2001) World Population Prospects: The 2000 Revision. Available online at: http://www.un.org/spanish/esa/population/ wpp2000h.pdf (accessed on 13 October 2010).
-
(2001)
World Population Prospects: The 2000 Revision
-
-
-
184
-
-
72549101766
-
An agent-based framework for intrusion detection alert verification and event correlation
-
Uphoff, B. and Wong, J.S. (2008) 'An agent-based framework for intrusion detection alert verification and event correlation', International Journal of Security and Networks, Vol. 3, No. 3, pp.193-200.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 193-200
-
-
Uphoff, B.1
Wong, J.S.2
-
186
-
-
79951651888
-
Editorial
-
Wang, H. and Jia, X. (2010) 'Editorial', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.77-78.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 77-78
-
-
Wang, H.1
Jia, X.2
-
187
-
-
77949830969
-
A cross-layer authentication design for secure video transportation in wireless sensor network
-
Wang, J. and Smith, G.L. (2010) 'A cross-layer authentication design for secure video transportation in wireless sensor network', International Journal of Security and Networks, Vol. 5, No. 1, pp.63-76.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 63-76
-
-
Wang, J.1
Smith, G.L.2
-
188
-
-
84899740998
-
Visualisation of wormholes in underwater sensor networks: A distributed approach
-
DOI 10.1504/IJSN.2008.016198
-
Wang, W., Kong, J., Bhargava, B. and Gerla, M. (2008) 'Visualisation of wormholes in underwater sensor networks: a distributed approach', International Journal of Security and Networks, Vol. 3, No. 1, pp.10-23. (Pubitemid 351546018)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 10-23
-
-
Wang, W.1
Kong, J.2
Bhargava, B.3
Gerla, M.4
-
190
-
-
68149124499
-
Using link RTT to passively detect unapproved wireless nodes
-
Watkins, L., Beyah, R. and Corbett, C. (2009) 'Using link RTT to passively detect unapproved wireless nodes', International Journal of Security and Networks, Vol. 4, No. 3, pp.153-163.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.3
, pp. 153-163
-
-
Watkins, L.1
Beyah, R.2
Corbett, C.3
-
191
-
-
79954573740
-
-
Mote, (accessed on 13 October 2010)
-
Webopedia (2010) Mote. Available online at: http://www.webopedia.com/ TERM/M/mote.html (accessed on 13 October 2010).
-
(2010)
Webopedia
-
-
-
193
-
-
70450266137
-
-
accessed on 13 October 2010
-
Welsh, M., Malan, D., Duncan, B., Fulford-Jones, T. and Moulton, S. (2004) Wireless Sensor Networks for Emergency Medical Care. Available online at: http://www.cs.usask.ca/faculty/ludwig/SensorGrid/docs/E-HEALTH%20PAPERS/ codeblue%20SLIDES.pdf (accessed on 13 October 2010).
-
(2004)
Wireless Sensor Networks for Emergency Medical Care
-
-
Welsh, M.1
Malan, D.2
Duncan, B.3
Fulford-Jones, T.4
Moulton, S.5
-
194
-
-
11244314672
-
Resuscitation monitoring with a wireless sensor network
-
28 October
-
Welsh, M., Myung, D., Gaynor, M. and Moulton, S. (2003) 'Resuscitation monitoring with a wireless sensor network', Supplement to Circulation: Journal of the American Heart Association, 28 October.
-
(2003)
Supplement to Circulation: Journal of the American Heart Association
-
-
Welsh, M.1
Myung, D.2
Gaynor, M.3
Moulton, S.4
-
195
-
-
18844378578
-
Taming the underlying challenges of reliable multihop routing in sensor networks
-
SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems
-
Woo, A., Tong, T. and Culler, D. (2003) 'Taming the underlying challenges of reliable multihop routing in sensor networks', Proceedings of the 1st ACM Conference on Embedded Networked Sensor Systems (SenSys 2003), 5-7 November, Los Angeles, CA, USA, pp.14-27. (Pubitemid 40682331)
-
(2003)
SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems
, pp. 14-27
-
-
Woo, A.1
Tong, T.2
Culler, D.3
-
196
-
-
61849158146
-
An efficient group key management scheme for mobile ad hoc networks
-
Wu, B., Wu, J. and Dong, Y. (2009) 'An efficient group key management scheme for mobile ad hoc networks', International Journal of Security and Networks, Vol. 4, Nos. 1/2, pp.125-134.
-
(2009)
International Journal of Security and Networks
, vol.4
, Issue.1-2
, pp. 125-134
-
-
Wu, B.1
Wu, J.2
Dong, Y.3
-
198
-
-
74549151204
-
Security mechanisms, attacks, and security enhancements for the IEEE 802.11 WLANs
-
Xiao, Y., Bandela, C., Du, X., Pan, Y. and Dass, K. (2006a) 'Security mechanisms, attacks, and security enhancements for the IEEE 802.11 WLANs', International Journal of Wireless and Mobile Computing, Vol. 1, Nos. 3/4, pp.276-288.
-
(2006)
International Journal of Wireless and Mobile Computing
, vol.1
, Issue.3-4
, pp. 276-288
-
-
Xiao, Y.1
Bandela, C.2
Du, X.3
Pan, Y.4
Dass, K.5
-
199
-
-
80053603333
-
Temporal key integrity protocol and its security issues in IEEE 802.11i
-
Wu, S-L. and Tseng, Y-C. (Eds), Chapter 16, Auerbach Publications, Taylor & Francis Group, New York
-
Xiao, Y., Dass, K., Zheng, J. and Wu, K. (2007a) 'Temporal key integrity protocol and its security issues in IEEE 802.11i', in Wu, S-L. and Tseng, Y-C. (Eds): Wireless Ad Hoc Networking: Personal-Area, Local-Area, and Sensory-Area Networks, Chapter 16, Auerbach Publications, Taylor & Francis Group, New York, pp.419-435.
-
(2007)
Wireless Ad Hoc Networking: Personal-Area, Local-Area, and Sensory-Area Networks
, pp. 419-435
-
-
Xiao, Y.1
Dass, K.2
Zheng, J.3
Wu, K.4
-
200
-
-
8744292911
-
Voice and video transmissions with global data parameter control for the IEEE 802.11e enhance distributed channel access
-
Xiao, Y. and Li, H. (2004) 'Voice and video transmissions with global data parameter control for the IEEE 802.11e enhance distributed channel access', IEEE Transactions on Parallel and Distributed Systems, Vol. 15, No. 11, pp.1041-1053.
-
(2004)
IEEE Transactions on Parallel and Distributed Systems
, vol.15
, Issue.11
, pp. 1041-1053
-
-
Xiao, Y.1
Li, H.2
-
201
-
-
33646943487
-
Security and privacy in RFID and applications in telemedicine
-
DOI 10.1109/MCOM.2006.1632651
-
Xiao, Y., Shen, X., Sun, B. and Cai, L. (2006b) 'Security and privacy in RFID and applications in telemedicine', IEEE Communications Magazine, Special Issue on Quality Assurance and Devices in Telemedicine, pp.64-72. (Pubitemid 43792670)
-
(2006)
IEEE Communications Magazine
, vol.44
, Issue.4
, pp. 64-72
-
-
Xiao, Y.1
Shen, X.2
Sun, B.3
Cai, L.4
-
202
-
-
34247512176
-
Radio frequency identification: Technologies, applications, and research issues
-
DOI 10.1002/wcm.365
-
Xiao, Y., Yu, S., Wu, K., Ni, Q., Janecek, C. and Nordstad, J. (2007b) 'Radio frequency identification: technologies, applications, and research issues', Journal of Wireless Communications and Mobile Computing, Vol. 7, No. 4, pp.457-472. (Pubitemid 46659482)
-
(2007)
Wireless Communications and Mobile Computing
, vol.7
, Issue.4
, pp. 457-472
-
-
Xiao, Y.1
Yu, S.2
Wu, K.3
Ni, Q.4
Janecek, C.5
Nordstad, J.6
-
203
-
-
62249216277
-
Formal modelling and analysis of XML firewall for service-oriented systems
-
Xu, H., Ayachit, M. and Reddyreddy, A. (2008) 'Formal modelling and analysis of XML firewall for service-oriented systems', International Journal of Security and Networks, Vol. 3, No. 3, pp.147-160.
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.3
, pp. 147-160
-
-
Xu, H.1
Ayachit, M.2
Reddyreddy, A.3
-
204
-
-
77949835881
-
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
-
Xu, L., Chen, S., Huang, X. and Mu, Y. (2010) 'Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks', International Journal of Security and Networks, Vol. 5, No. 1, pp.35-44.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 35-44
-
-
Xu, L.1
Chen, S.2
Huang, X.3
Mu, Y.4
-
205
-
-
77949864345
-
Lightweight authentication protocol for mobile RFID networks
-
Yang, M. (2010) 'Lightweight authentication protocol for mobile RFID networks', International Journal of Security and Networks, Vol. 5, No. 1, pp.53-62.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 53-62
-
-
Yang, M.1
-
206
-
-
79951651888
-
Editorial
-
Yang, M., Liu, J.C.L. and Tseng, Y. (2010) 'Editorial', International Journal of Security and Networks, Vol. 5, No. 1, pp.1-3.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.1
, pp. 1-3
-
-
Yang, M.1
Liu, J.C.L.2
Tseng, Y.3
-
207
-
-
79954585471
-
Application-aware secure multicast for power grid communications
-
Zhang, J. and Gunter, C.A. (2011) 'Application-aware secure multicast for power grid communications', International Journal of Security and Networks, Vol. 6, No. 1, pp.40-52.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.1
, pp. 40-52
-
-
Zhang, J.1
Gunter, C.A.2
-
208
-
-
77949713022
-
Looking at a class of RFID APs through GNY logic
-
Zhang, X., Gao, Q. and Saad, M.K. (2010) 'Looking at a class of RFID APs through GNY logic', International Journal of Security and Networks, Vol. 5, Nos. 2/3, pp.135-146.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.2-3
, pp. 135-146
-
-
Zhang, X.1
Gao, Q.2
Saad, M.K.3
-
209
-
-
79551551587
-
Analysis of flowcorrelation attacks in anonymity network
-
Zhu, Y., Fu, X., Bettati, R. and Zhao, W. (2007) 'Analysis of flowcorrelation attacks in anonymity network', International Journal of Security and Networks, Vol. 2, Nos. 1/2, pp.137-153.
-
(2007)
International Journal of Security and Networks
, vol.2
, Issue.1-2
, pp. 137-153
-
-
Zhu, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
210
-
-
78650662129
-
Enhancing intrusion detection system with proximity information
-
Zhuang, Z., Li, Y. and Chen, Z. (2010) 'Enhancing intrusion detection system with proximity information', International Journal of Security and Networks, Vol. 5, No. 4 pp.207-219.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 207-219
-
-
Zhuang, Z.1
Li, Y.2
Chen, Z.3
-
211
-
-
79951619296
-
A novel conference key management solution for secure dynamic conferencing
-
DOI 10.1504/IJSN.2008.016201
-
Zou, X. and Karandikar, Y. (2008) 'A novel conference key management solution for secure dynamic conferencing', International Journal of Security and Networks, Vol. 3, No. 1, pp.47-53. (Pubitemid 351546021)
-
(2008)
International Journal of Security and Networks
, vol.3
, Issue.1
, pp. 47-53
-
-
Zou, X.1
Karandikar, Y.2
|