메뉴 건너뛰기




Volumn 16, Issue 6, 2011, Pages 695-712

Temporal accountability and anonymity in medical sensor networks

Author keywords

Medical sensor networks; Temporal accountability

Indexed keywords

ANALYSIS RESULTS; ANONYMOUS SYSTEMS; CRITICAL TIME; HEALTH CARE COSTS; MEDICAL SENSOR NETWORKS; MEDICAL SENSORS; PERSONAL PRIVACY; SENSITIVE INFORMATIONS; TEMPORAL ACCOUNTABILITY; TIME SIGNALS; TRANSMISSION STRATEGIES; WEARABLE DEVICES;

EID: 84855641355     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11036-010-0254-6     Document Type: Article
Times cited : (18)

References (55)
  • 1
    • 70449535046 scopus 로고    scopus 로고
    • Wikipedia (2009) Heart disease. http://en.wikipedia.org/wiki/Heart- diseases
    • (2009) Heart Disease.
  • 2
    • 59549091540 scopus 로고    scopus 로고
    • Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare
    • Hu F, Celentano L, Xiao Y (2008) Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare. Wireless Comm Mobile Comput 9(1):85-101
    • (2008) Wireless Comm Mobile Comput , vol.9 , Issue.1 , pp. 85-101
    • Hu, F.1    Celentano, L.2    Xiao, Y.3
  • 5
  • 6
    • 67650731620 scopus 로고    scopus 로고
    • Editorial
    • Xiao Y (2006) Editorial. Int J Secur Netw 1(1/2):1
    • (2006) Int J Secur Netw , vol.1 , Issue.1-2 , pp. 1
    • Xiao, Y.1
  • 7
    • 34548601229 scopus 로고    scopus 로고
    • Workflow authorization in mediator-free environments
    • Shehab M, Bertino E, Ghafoor A (2006) Workflow authorization in mediator-free environments. Int J Secur Netw 1(1/2):2-12
    • (2006) Int J Secur Netw , vol.1 , Issue.1-2 , pp. 2-12
    • Shehab, M.1    Bertino, E.2    Ghafoor, A.3
  • 8
    • 56849130276 scopus 로고    scopus 로고
    • Vulnerability analysis of certificate graphs
    • Jung E, Gouda MG (2006) Vulnerability analysis of certificate graphs. Int J Secur Netw 1(1/2):13-23
    • (2006) Int J Secur Netw , vol.1 , Issue.1-2 , pp. 13-23
    • Jung, E.1    Gouda, M.G.2
  • 9
    • 54249117650 scopus 로고    scopus 로고
    • Secure scalable group signature with dynamic joins and separable authorities
    • Kiayias A, Yung M (2006) Secure scalable group signature with dynamic joins and separable authorities. Int J Secur Netw 1(1/2):24-45
    • (2006) Int J Secur Netw , vol.1 , Issue.1-2 , pp. 24-45
    • Kiayias, A.1    Yung, M.2
  • 10
    • 70449688081 scopus 로고    scopus 로고
    • A survey of key evolving cryptosystems
    • Franklin M (2006) A survey of key evolving cryptosystems. Int J Secur Netw 1(1/2):46-53
    • (2006) Int J Secur Netw , vol.1 , Issue.1-2 , pp. 46-53
    • Franklin, M.1
  • 11
    • 70449498446 scopus 로고    scopus 로고
    • A taxonomy of internet traceback
    • Hamadeh I, Kesidis G (2006) A taxonomy of internet traceback. Int J Secur Netw 1(1/2):54-61
    • (2006) Int J Secur Netw , vol.1 , Issue.1-2 , pp. 54-61
    • Hamadeh, I.1    Kesidis, G.2
  • 13
    • 74549166520 scopus 로고    scopus 로고
    • Wireless networking security: Open issues in trust, management, interoperation and measurement
    • Evans JB, Wang W, Ewy BJ (2006) Wireless networking security: open issues in trust, management, interoperation and measurement. Int J Secur Netw 1(1/2):84-94
    • (2006) Int J Secur Netw , vol.1 , Issue.1-2 , pp. 84-94
    • Evans, J.B.1    Wang, W.2    Ewy, B.J.3
  • 14
    • 72449209394 scopus 로고    scopus 로고
    • Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
    • Englund H, Johansson T (2006) Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. Int J Secur Netw 1(1/2):95-102
    • (2006) Int J Secur Netw , vol.1 , Issue.1-2 , pp. 95-102
    • Englund, H.1    Johansson, T.2
  • 15
    • 38349171412 scopus 로고    scopus 로고
    • Building trust in peerto-peer systems: A review
    • Zhu B, Jajodia S, Kankanhalli MS (2006) Building trust in peerto-peer systems: a review. Int J Secur Netw 1(1/2):103-112
    • (2006) Int J Secur Netw , vol.1 , Issue.1-2 , pp. 103-112
    • Zhu, B.1    Jajodia, S.2    Kankanhalli, M.S.3
  • 16
    • 40949119439 scopus 로고    scopus 로고
    • Secure collaborations over message boards
    • Ramkumar M, Memon N (2006) Secure collaborations over message boards. Int J Secur Netw 1(1/2):113-124
    • (2006) Int J Secur Netw , vol.1 , Issue.1-2 , pp. 113-124
    • Ramkumar, M.1    Memon, N.2
  • 17
    • 79951685922 scopus 로고    scopus 로고
    • Editorial: Security issues on sensor networks
    • Xiao Y, Jia X, Sun B, Du X (2006) Editorial: security issues on sensor networks. Int J Secur Netw 1(3/4):125-126
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 125-126
    • Xiao, Y.1    Jia, X.2    Sun, B.3    Du, X.4
  • 18
    • 49949083706 scopus 로고    scopus 로고
    • Elliptic curve cryptography-based access control
    • Wang H, Sheng B, Li Q (2006) Elliptic curve cryptography-based access control. Int J Secur Netw 1(3/4):127-137
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 127-137
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 19
    • 79955980141 scopus 로고    scopus 로고
    • A lightweight encryption and authentication scheme for wireless sensor networks
    • Zheng J, Li J, Lee MJ, Anshel M (2006) A lightweight encryption and authentication scheme for wireless sensor networks. Int J Secur Netw 1(3/4):138-146
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 138-146
    • Zheng, J.1    Li, J.2    Lee, M.J.3    Anshel, M.4
  • 20
    • 79951694028 scopus 로고    scopus 로고
    • Analysis of routing security-energy tradeoffs in wireless sensor networks
    • Al-Karaki JN (2006) Analysis of routing security-energy tradeoffs in wireless sensor networks. Int J Secur Netw 1(3/4):147-157
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 147-157
    • Al-Karaki, J.N.1
  • 21
    • 49949107235 scopus 로고    scopus 로고
    • Load-balanced key establishment methodologies in wireless sensor networks
    • Araz O, Qi H (2006) Load-balanced key establishment methodologies in wireless sensor networks. Int J Secur Netw 1(3/4):158-166
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 158-166
    • Araz, O.1    Qi, H.2
  • 22
    • 84890880165 scopus 로고    scopus 로고
    • Limiting DoS attacks during multihop data delivery in wireless sensor networks
    • Deng J, Han R, Mishra S (2006) Limiting DoS attacks during multihop data delivery in wireless sensor networks. Int J Secur Netw 1(3/4):167-178
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 167-178
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 23
    • 37849002205 scopus 로고    scopus 로고
    • End-to-end security mechanisms for SMS
    • Hwu J, Hsu S, Lin Y-B, Chen R-J (2006) End-to-end security mechanisms for SMS. Int J Secur Netw 1(3/4):177-183
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 177-183
    • Hwu, J.1    Hsu, S.2    Lin, Y.-B.3    Chen, R.-J.4
  • 24
    • 77955716028 scopus 로고    scopus 로고
    • The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
    • Wang X (2006) The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. Int J Secur Netw 1(3/4):184-197
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 184-197
    • Wang, X.1
  • 25
    • 51249122792 scopus 로고    scopus 로고
    • A self-encryption authentication protocol for teleconference services
    • Jiang Y, Lin C, Shi M, Shen X (2006) A self-encryption authentication protocol for teleconference services. Int J Secur Netw 1(3/4):198-205
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 198-205
    • Jiang, Y.1    Lin, C.2    Shi, M.3    Shen, X.4
  • 26
    • 77955290752 scopus 로고    scopus 로고
    • An adaptive expert system approach for intrusion detection
    • Owens SF, Levary RR (2006) An adaptive expert system approach for intrusion detection. Int J Secur Netw 1(3/4):206-217
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 206-217
    • Owens, S.F.1    Levary, R.R.2
  • 27
    • 77955710234 scopus 로고    scopus 로고
    • Convertible identity-based anonymous designated ring signatures
    • Chen Y, Susilo W, Mu Y (2006) Convertible identity-based anonymous designated ring signatures. Int J Secur Netw 1(3/4):218-225
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 218-225
    • Chen, Y.1    Susilo, W.2    Mu, Y.3
  • 28
    • 79951716783 scopus 로고    scopus 로고
    • Low-power authenticated group key agreement for heterogeneous wireless networks
    • Teo J, Tan C, Ng J (2006) Low-power authenticated group key agreement for heterogeneous wireless networks. Int J Secur Netw 1(3/4):226-236
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 226-236
    • Teo, J.1    Tan, C.2    Ng, J.3
  • 29
    • 77954644745 scopus 로고    scopus 로고
    • A new signature scheme without random oracles
    • Tan C (2006) A new signature scheme without random oracles. Int J Secur Netw 1(3/4):237-242
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 237-242
    • Tan, C.1
  • 30
    • 67649498303 scopus 로고    scopus 로고
    • Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection
    • Liu Y, Comaniciu C, Man H (2006) Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. Int J Secur Netw 1(3/4):243-254
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 243-254
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 31
    • 44649095872 scopus 로고    scopus 로고
    • A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks
    • Karyotis V, Papavassiliou S, Grammatikou M, Maglaris V (2006) A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks. Int J Secur Netw 1(3/4):255-265
    • (2006) Int J Secur Netw , vol.1 , Issue.3-4 , pp. 255-265
    • Karyotis, V.1    Papavassiliou, S.2    Grammatikou, M.3    Maglaris, V.4
  • 32
    • 41149164678 scopus 로고    scopus 로고
    • PeerReview: Practical accountability for distributed systems
    • DOI 10.1145/1294261.1294279, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
    • Haeberlen A, Kouznetsov P, Druschel P (2007) PeerReview: practical accountability for distributed systems. ACM SIGOPS Operating Systems Review 41(6):175-188 (Pubitemid 351429375)
    • (2007) Operating Systems Review (ACM) , pp. 175-188
    • Haeberlen, A.1    Kouznetsov, P.2    Druschel, P.3
  • 35
    • 12744252915 scopus 로고    scopus 로고
    • Remote monitoring of a heterogeneous sensor network for biomedical research in space
    • Proceedings of the International Conference on Wireless Networks, ICWN'04 - Proceedings of the International Conference on Pervasive Computing and Communications, PCC'04
    • Liszka KJ, York DW, Mackin MA, Lichter MJ (2004) Remote monitoring of a heterogeneous sensor network for biomedical research in space. In: Proceedings of the International Conference on Pervasive Computing and Communications, June 2004, pp 829-833 (Pubitemid 40157334)
    • (2004) Proceedings of the International Conference on Wireless Networks, ICWN'04 , vol.2 , pp. 829-833
    • Liszka, K.J.1    York, D.W.2    Rosenbaum, D.S.3    Mackint, M.A.4    Lichter, M.J.5
  • 37
    • 44349157008 scopus 로고    scopus 로고
    • Low-cost wireless sensor networks for remote cardiac patients monitoring applications
    • Hu F, Jiang M, Xiao Y (2007) Low-cost wireless sensor networks for remote cardiac patients monitoring applications. Wireless Comm Mobile Comput 8(4):513-529
    • (2007) Wireless Comm Mobile Comput , vol.8 , Issue.4 , pp. 513-529
    • Hu, F.1    Jiang, M.2    Xiao, Y.3
  • 38
    • 70350060199 scopus 로고    scopus 로고
    • Flow-net methodology for accountability in wireless networks
    • Xiao Y (2009) Flow-net methodology for accountability in wireless networks. IEEE Netw 23(5):30-37
    • (2009) IEEE Netw , vol.23 , Issue.5 , pp. 30-37
    • Xiao, Y.1
  • 40
    • 77953884604 scopus 로고    scopus 로고
    • P-accountable networked systems
    • Work in Progress (WIP) Track, accepted
    • Xiao Z, Xiao Y (2010) P-accountable networked systems. In: Proceeding of INFOCOM 2010, Work in Progress (WIP) Track, accepted
    • (2010) Proceeding of INFOCOM 2010
    • Xiao, Z.1    Xiao, Y.2
  • 42
    • 42649088128 scopus 로고    scopus 로고
    • Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
    • DOI 10.1109/MCOM.2008.4481350
    • Xiao Y (2008) Accountability for wireless LANs, ad hoc networks, and wireless mesh networks. IEEE Communication Magazine, special issue on Security in Mobile Ad Hoc and Sensor Networks, 46(4), pp 116-126, Apr (Pubitemid 351593417)
    • (2008) IEEE Communications Magazine , vol.46 , Issue.4 , pp. 116-126
    • Xiao, Y.1
  • 44
    • 33745689203 scopus 로고    scopus 로고
    • Accountability in electronic commerce protocols
    • Kailar R (1996) Accountability in electronic commerce protocols. IEEE Trans Softw Eng 22(5):313-328 (Pubitemid 126771673)
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.5 , pp. 313-328
    • Kailar, R.1
  • 45
    • 84855687210 scopus 로고    scopus 로고
    • Analyzing the temporal accountability of secure protocols
    • Liang J, Ao Q, You J (2002) Analyzing the temporal accountability of secure protocols. Chin J Electron (Acta Electronica Sinica) 30(10):1451-1454
    • (2002) Chin J Electron (Acta Electronica Sinica) , vol.30 , Issue.10 , pp. 1451-1454
    • Liang, J.1    Ao, Q.2    You, J.3
  • 48
    • 85002987937 scopus 로고    scopus 로고
    • Time synchronization in sensor networks and underwater sensor networks
    • CRC Press, ISBN-10: 1420067117, ISBN-13: 978-1420067118, 2010, Chapter 6
    • Galloway M, Zhang Y, Xiao Y, Shao P (2010) Time synchronization in sensor networks and underwater sensor networks. Underwater Acoustic Sensor Networks, CRC Press, ISBN-10: 1420067117, ISBN-13: 978-1420067118, 2010, Chapter 6, pp 143-175
    • (2010) Underwater Acoustic Sensor Networks , pp. 143-175
    • Galloway, M.1    Zhang, Y.2    Xiao, Y.3    Shao, P.4
  • 49
    • 70350234578 scopus 로고    scopus 로고
    • A survey of anonymity in wireless communication systems
    • Chen H, Xiao Y, Hong X, Hu F, Xie J (2008) A survey of anonymity in wireless communication systems. Secur Comm Network 2(5):427-444
    • (2008) Secur Comm Network , vol.2 , Issue.5 , pp. 427-444
    • Chen, H.1    Xiao, Y.2    Hong, X.3    Hu, F.4    Xie, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.