-
1
-
-
70449535046
-
-
Wikipedia (2009) Heart disease. http://en.wikipedia.org/wiki/Heart- diseases
-
(2009)
Heart Disease.
-
-
-
2
-
-
59549091540
-
Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare
-
Hu F, Celentano L, Xiao Y (2008) Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare. Wireless Comm Mobile Comput 9(1):85-101
-
(2008)
Wireless Comm Mobile Comput
, vol.9
, Issue.1
, pp. 85-101
-
-
Hu, F.1
Celentano, L.2
Xiao, Y.3
-
3
-
-
0041620202
-
Towards accountability for electronic patient records
-
(CBMS'03), New York, USA, Jun 2003
-
Ferreira A, Shiu S, Baldwin A (2003) Towards accountability for electronic patient records. In: Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems, (CBMS'03), New York, USA, pp 189-194, Jun 2003
-
(2003)
Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems
, pp. 189-194
-
-
Ferreira, A.1
Shiu, S.2
Baldwin, A.3
-
4
-
-
47349108169
-
Accountability issues in multihop message communication
-
Richardson, USA, May 1999
-
Bhattacharya S, Paul R (1999) Accountability issues in multihop message communication. In: IEEE Symposium on Application-Specific Systems and Software Engineering and Technology (ASSET'99), Richardson, USA, pp 74-81, May 1999
-
(1999)
IEEE Symposium on Application-Specific Systems and Software Engineering and Technology (ASSET'99)
, pp. 74-81
-
-
Bhattacharya, S.1
Paul, R.2
-
6
-
-
67650731620
-
Editorial
-
Xiao Y (2006) Editorial. Int J Secur Netw 1(1/2):1
-
(2006)
Int J Secur Netw
, vol.1
, Issue.1-2
, pp. 1
-
-
Xiao, Y.1
-
7
-
-
34548601229
-
Workflow authorization in mediator-free environments
-
Shehab M, Bertino E, Ghafoor A (2006) Workflow authorization in mediator-free environments. Int J Secur Netw 1(1/2):2-12
-
(2006)
Int J Secur Netw
, vol.1
, Issue.1-2
, pp. 2-12
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
8
-
-
56849130276
-
Vulnerability analysis of certificate graphs
-
Jung E, Gouda MG (2006) Vulnerability analysis of certificate graphs. Int J Secur Netw 1(1/2):13-23
-
(2006)
Int J Secur Netw
, vol.1
, Issue.1-2
, pp. 13-23
-
-
Jung, E.1
Gouda, M.G.2
-
9
-
-
54249117650
-
Secure scalable group signature with dynamic joins and separable authorities
-
Kiayias A, Yung M (2006) Secure scalable group signature with dynamic joins and separable authorities. Int J Secur Netw 1(1/2):24-45
-
(2006)
Int J Secur Netw
, vol.1
, Issue.1-2
, pp. 24-45
-
-
Kiayias, A.1
Yung, M.2
-
10
-
-
70449688081
-
A survey of key evolving cryptosystems
-
Franklin M (2006) A survey of key evolving cryptosystems. Int J Secur Netw 1(1/2):46-53
-
(2006)
Int J Secur Netw
, vol.1
, Issue.1-2
, pp. 46-53
-
-
Franklin, M.1
-
11
-
-
70449498446
-
A taxonomy of internet traceback
-
Hamadeh I, Kesidis G (2006) A taxonomy of internet traceback. Int J Secur Netw 1(1/2):54-61
-
(2006)
Int J Secur Netw
, vol.1
, Issue.1-2
, pp. 54-61
-
-
Hamadeh, I.1
Kesidis, G.2
-
12
-
-
77954341184
-
An approach to synthesise safe systems
-
Jhumka A, Freiling F, Fetzer C, Suri N (2006) An approach to synthesise safe systems. Int J Sec Netw 1(1/2):62-74
-
(2006)
Int J Sec Netw
, vol.1
, Issue.1-2
, pp. 62-74
-
-
Jhumka, A.1
Freiling, F.2
Fetzer, C.3
Suri, N.4
-
13
-
-
74549166520
-
Wireless networking security: Open issues in trust, management, interoperation and measurement
-
Evans JB, Wang W, Ewy BJ (2006) Wireless networking security: open issues in trust, management, interoperation and measurement. Int J Secur Netw 1(1/2):84-94
-
(2006)
Int J Secur Netw
, vol.1
, Issue.1-2
, pp. 84-94
-
-
Evans, J.B.1
Wang, W.2
Ewy, B.J.3
-
14
-
-
72449209394
-
Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
-
Englund H, Johansson T (2006) Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. Int J Secur Netw 1(1/2):95-102
-
(2006)
Int J Secur Netw
, vol.1
, Issue.1-2
, pp. 95-102
-
-
Englund, H.1
Johansson, T.2
-
15
-
-
38349171412
-
Building trust in peerto-peer systems: A review
-
Zhu B, Jajodia S, Kankanhalli MS (2006) Building trust in peerto-peer systems: a review. Int J Secur Netw 1(1/2):103-112
-
(2006)
Int J Secur Netw
, vol.1
, Issue.1-2
, pp. 103-112
-
-
Zhu, B.1
Jajodia, S.2
Kankanhalli, M.S.3
-
16
-
-
40949119439
-
Secure collaborations over message boards
-
Ramkumar M, Memon N (2006) Secure collaborations over message boards. Int J Secur Netw 1(1/2):113-124
-
(2006)
Int J Secur Netw
, vol.1
, Issue.1-2
, pp. 113-124
-
-
Ramkumar, M.1
Memon, N.2
-
17
-
-
79951685922
-
Editorial: Security issues on sensor networks
-
Xiao Y, Jia X, Sun B, Du X (2006) Editorial: security issues on sensor networks. Int J Secur Netw 1(3/4):125-126
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 125-126
-
-
Xiao, Y.1
Jia, X.2
Sun, B.3
Du, X.4
-
18
-
-
49949083706
-
Elliptic curve cryptography-based access control
-
Wang H, Sheng B, Li Q (2006) Elliptic curve cryptography-based access control. Int J Secur Netw 1(3/4):127-137
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 127-137
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
19
-
-
79955980141
-
A lightweight encryption and authentication scheme for wireless sensor networks
-
Zheng J, Li J, Lee MJ, Anshel M (2006) A lightweight encryption and authentication scheme for wireless sensor networks. Int J Secur Netw 1(3/4):138-146
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 138-146
-
-
Zheng, J.1
Li, J.2
Lee, M.J.3
Anshel, M.4
-
20
-
-
79951694028
-
Analysis of routing security-energy tradeoffs in wireless sensor networks
-
Al-Karaki JN (2006) Analysis of routing security-energy tradeoffs in wireless sensor networks. Int J Secur Netw 1(3/4):147-157
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 147-157
-
-
Al-Karaki, J.N.1
-
21
-
-
49949107235
-
Load-balanced key establishment methodologies in wireless sensor networks
-
Araz O, Qi H (2006) Load-balanced key establishment methodologies in wireless sensor networks. Int J Secur Netw 1(3/4):158-166
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 158-166
-
-
Araz, O.1
Qi, H.2
-
22
-
-
84890880165
-
Limiting DoS attacks during multihop data delivery in wireless sensor networks
-
Deng J, Han R, Mishra S (2006) Limiting DoS attacks during multihop data delivery in wireless sensor networks. Int J Secur Netw 1(3/4):167-178
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 167-178
-
-
Deng, J.1
Han, R.2
Mishra, S.3
-
23
-
-
37849002205
-
End-to-end security mechanisms for SMS
-
Hwu J, Hsu S, Lin Y-B, Chen R-J (2006) End-to-end security mechanisms for SMS. Int J Secur Netw 1(3/4):177-183
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 177-183
-
-
Hwu, J.1
Hsu, S.2
Lin, Y.-B.3
Chen, R.-J.4
-
24
-
-
77955716028
-
The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
-
Wang X (2006) The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones. Int J Secur Netw 1(3/4):184-197
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 184-197
-
-
Wang, X.1
-
25
-
-
51249122792
-
A self-encryption authentication protocol for teleconference services
-
Jiang Y, Lin C, Shi M, Shen X (2006) A self-encryption authentication protocol for teleconference services. Int J Secur Netw 1(3/4):198-205
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 198-205
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
-
26
-
-
77955290752
-
An adaptive expert system approach for intrusion detection
-
Owens SF, Levary RR (2006) An adaptive expert system approach for intrusion detection. Int J Secur Netw 1(3/4):206-217
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 206-217
-
-
Owens, S.F.1
Levary, R.R.2
-
27
-
-
77955710234
-
Convertible identity-based anonymous designated ring signatures
-
Chen Y, Susilo W, Mu Y (2006) Convertible identity-based anonymous designated ring signatures. Int J Secur Netw 1(3/4):218-225
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 218-225
-
-
Chen, Y.1
Susilo, W.2
Mu, Y.3
-
28
-
-
79951716783
-
Low-power authenticated group key agreement for heterogeneous wireless networks
-
Teo J, Tan C, Ng J (2006) Low-power authenticated group key agreement for heterogeneous wireless networks. Int J Secur Netw 1(3/4):226-236
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 226-236
-
-
Teo, J.1
Tan, C.2
Ng, J.3
-
29
-
-
77954644745
-
A new signature scheme without random oracles
-
Tan C (2006) A new signature scheme without random oracles. Int J Secur Netw 1(3/4):237-242
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 237-242
-
-
Tan, C.1
-
30
-
-
67649498303
-
Modelling misbehaviour in ad hoc networks: A game theoretic approach for intrusion detection
-
Liu Y, Comaniciu C, Man H (2006) Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection. Int J Secur Netw 1(3/4):243-254
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 243-254
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
31
-
-
44649095872
-
A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks
-
Karyotis V, Papavassiliou S, Grammatikou M, Maglaris V (2006) A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks. Int J Secur Netw 1(3/4):255-265
-
(2006)
Int J Secur Netw
, vol.1
, Issue.3-4
, pp. 255-265
-
-
Karyotis, V.1
Papavassiliou, S.2
Grammatikou, M.3
Maglaris, V.4
-
32
-
-
41149164678
-
PeerReview: Practical accountability for distributed systems
-
DOI 10.1145/1294261.1294279, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
Haeberlen A, Kouznetsov P, Druschel P (2007) PeerReview: practical accountability for distributed systems. ACM SIGOPS Operating Systems Review 41(6):175-188 (Pubitemid 351429375)
-
(2007)
Operating Systems Review (ACM)
, pp. 175-188
-
-
Haeberlen, A.1
Kouznetsov, P.2
Druschel, P.3
-
34
-
-
36349009417
-
Telemedicine usage and potentials
-
Hong Kong, China, Mar 2007
-
Xiao Y, Takahashi D, Hu F (2007) Telemedicine usage and potentials. In: IEEE Wireless Communications and Networking Conference (WCNC'07), Hong Kong, China, Mar 2007, pp 2736-2740
-
(2007)
IEEE Wireless Communications and Networking Conference (WCNC'07)
, pp. 2736-2740
-
-
Xiao, Y.1
Takahashi, D.2
Hu, F.3
-
35
-
-
12744252915
-
Remote monitoring of a heterogeneous sensor network for biomedical research in space
-
Proceedings of the International Conference on Wireless Networks, ICWN'04 - Proceedings of the International Conference on Pervasive Computing and Communications, PCC'04
-
Liszka KJ, York DW, Mackin MA, Lichter MJ (2004) Remote monitoring of a heterogeneous sensor network for biomedical research in space. In: Proceedings of the International Conference on Pervasive Computing and Communications, June 2004, pp 829-833 (Pubitemid 40157334)
-
(2004)
Proceedings of the International Conference on Wireless Networks, ICWN'04
, vol.2
, pp. 829-833
-
-
Liszka, K.J.1
York, D.W.2
Rosenbaum, D.S.3
Mackint, M.A.4
Lichter, M.J.5
-
36
-
-
33645991463
-
Sensor networks for medical care
-
Harvard University
-
Shnayder V, Chen B, Lorincz K, Fulford-Jones TRF, Welsh M (2005) Sensor networks for medical care. Technical Report TR-08-05, Division of Engineering and Applied Sciences, Harvard University
-
(2005)
Technical Report TR-08-05, Division of Engineering and Applied Sciences
-
-
Shnayder, V.1
Chen, B.2
Lorincz, K.3
Fulford-Jones, T.R.F.4
Welsh, M.5
-
37
-
-
44349157008
-
Low-cost wireless sensor networks for remote cardiac patients monitoring applications
-
Hu F, Jiang M, Xiao Y (2007) Low-cost wireless sensor networks for remote cardiac patients monitoring applications. Wireless Comm Mobile Comput 8(4):513-529
-
(2007)
Wireless Comm Mobile Comput
, vol.8
, Issue.4
, pp. 513-529
-
-
Hu, F.1
Jiang, M.2
Xiao, Y.3
-
38
-
-
70350060199
-
Flow-net methodology for accountability in wireless networks
-
Xiao Y (2009) Flow-net methodology for accountability in wireless networks. IEEE Netw 23(5):30-37
-
(2009)
IEEE Netw
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
-
40
-
-
77953884604
-
P-accountable networked systems
-
Work in Progress (WIP) Track, accepted
-
Xiao Z, Xiao Y (2010) P-accountable networked systems. In: Proceeding of INFOCOM 2010, Work in Progress (WIP) Track, accepted
-
(2010)
Proceeding of INFOCOM 2010
-
-
Xiao, Z.1
Xiao, Y.2
-
42
-
-
42649088128
-
Accountability for wireless LANs, ad hoc networks, and wireless mesh networks
-
DOI 10.1109/MCOM.2008.4481350
-
Xiao Y (2008) Accountability for wireless LANs, ad hoc networks, and wireless mesh networks. IEEE Communication Magazine, special issue on Security in Mobile Ad Hoc and Sensor Networks, 46(4), pp 116-126, Apr (Pubitemid 351593417)
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 116-126
-
-
Xiao, Y.1
-
44
-
-
33745689203
-
Accountability in electronic commerce protocols
-
Kailar R (1996) Accountability in electronic commerce protocols. IEEE Trans Softw Eng 22(5):313-328 (Pubitemid 126771673)
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 313-328
-
-
Kailar, R.1
-
48
-
-
85002987937
-
Time synchronization in sensor networks and underwater sensor networks
-
CRC Press, ISBN-10: 1420067117, ISBN-13: 978-1420067118, 2010, Chapter 6
-
Galloway M, Zhang Y, Xiao Y, Shao P (2010) Time synchronization in sensor networks and underwater sensor networks. Underwater Acoustic Sensor Networks, CRC Press, ISBN-10: 1420067117, ISBN-13: 978-1420067118, 2010, Chapter 6, pp 143-175
-
(2010)
Underwater Acoustic Sensor Networks
, pp. 143-175
-
-
Galloway, M.1
Zhang, Y.2
Xiao, Y.3
Shao, P.4
-
49
-
-
70350234578
-
A survey of anonymity in wireless communication systems
-
Chen H, Xiao Y, Hong X, Hu F, Xie J (2008) A survey of anonymity in wireless communication systems. Secur Comm Network 2(5):427-444
-
(2008)
Secur Comm Network
, vol.2
, Issue.5
, pp. 427-444
-
-
Chen, H.1
Xiao, Y.2
Hong, X.3
Hu, F.4
Xie, J.5
-
53
-
-
0029711077
-
An authentication logic supporting synchronization, revocation, and recency
-
New Delhi, India, Mar. 1996
-
Stubblebine SG, Wright RN (1996) An authentication logic supporting synchronization, revocation, and recency. In: Proceeding of the 3rd ACM Conference on Computer and Communications Security. New Delhi, India, Mar. 1996, pp 95-105
-
(1996)
Proceeding of the 3rd ACM Conference on Computer and Communications Security
, pp. 95-105
-
-
Stubblebine, S.G.1
Wright, R.N.2
-
54
-
-
23944525543
-
A wireless sensor network for structural monitoring
-
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
-
Xu N, Rangwala S, Chintalapudi KK, Ganesan D, Broad A, Govindan R, Estrin D (2004) A wireless sensor network for structural monitoring. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems. Baltimore, U.S.A., Nov. 2004, pp 13-24 (Pubitemid 41563345)
-
(2004)
SenSys'04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems
, pp. 13-24
-
-
Xu, N.1
Rangwala, S.2
Chintalapudi, K.K.3
Ganesan, D.4
Broad, A.5
Govindan, R.6
Estrin, D.7
-
55
-
-
52449103789
-
Drifting clock model for network simulation in time synchronization
-
Dalian, China, June 2008
-
Quan Y, Liu G (2008) Drifting clock model for network simulation in time synchronization. In Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control, Dalian, China, June 2008, pp 385-389
-
(2008)
Proceedings of the 2008 3rd International Conference on Innovative Computing Information and Control
, pp. 385-389
-
-
Quan, Y.1
Liu, G.2
|