-
1
-
-
22144462173
-
-
[Online]. Available
-
J. H. U. Partners for Solutions and the Robert Wood Johnson Foundation, "Chronic conditions:making the case for ongoing care," 2004. [Online]. Available: http://www.partnershipforsolutions.org/DMS/files/chronicbook2004.pdf
-
(2004)
Chronic Conditions:Making the Case for Ongoing Care
-
-
-
3
-
-
51649130466
-
A novel fair incentive protocol for mobile ad hoc networks
-
R. Lu, X. Lin, H. Zhu, C. Zhang, P.-H. Ho, and X. Shen, "A novel fair incentive protocol for mobile ad hoc networks," in Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE, 31 2008-april 3 2008, pp. 3237-3242.
-
Wireless Communications and Networking Conference, 2008. WCNC 2008. IEEE, 31 2008-april 3 2008
, pp. 3237-3242
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Zhang, C.4
Ho, P.-H.5
Shen, X.6
-
5
-
-
52149103544
-
Timestamp authentication protocol for remote monitoring in ehealth
-
K. Elmufti, D. Weerasinghe, M. Rajarajan, V. Rakocevic, and S. Khan, "Timestamp authentication protocol for remote monitoring in ehealth,"in 2nd International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2008), jan. 2008, pp. 73-76.
-
2nd International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth 2008), Jan. 2008
, pp. 73-76
-
-
Elmufti, K.1
Weerasinghe, D.2
Rajarajan, M.3
Rakocevic, V.4
Khan, S.5
-
6
-
-
67349150656
-
Remote patient monitoring service using heterogeneous wireless access networks: Architecture and optimization
-
May
-
D. Niyato, E. Hossain, and S. Camorlinga, "Remote patient monitoring service using heterogeneous wireless access networks: architecture and optimization," Selected Areas in Communications, IEEE Journal on, vol. 27, no. 4, pp. 412-423, May 2009.
-
(2009)
Selected Areas in Communications, IEEE Journal on
, vol.27
, Issue.4
, pp. 412-423
-
-
Niyato, D.1
Hossain, E.2
Camorlinga, S.3
-
7
-
-
67349253018
-
Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
-
may.
-
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems,"Selected Areas in Communications, IEEE Journal on, vol. 27, no. 4, pp. 365-378, may. 2009.
-
(2009)
Selected Areas in Communications, IEEE Journal on
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
8
-
-
79959287901
-
Secure and quality of service assurance scheduling scheme for wban with application to ehealth
-
M. Barua, M. S. Alam, X. Liang, and X. Shen, "Secure and quality of service assurance scheduling scheme for wban with application to ehealth," in Wireless Communications and Networking Conference (WCNC), 2011 IEEE, Cancun, Quintana-Roo, Mexico, 2011, pp. 1-5.
-
Wireless Communications and Networking Conference (WCNC), 2011 IEEE, Cancun, Quintana-Roo, Mexico, 2011
, pp. 1-5
-
-
Barua, M.1
Alam, M.S.2
Liang, X.3
Shen, X.4
-
9
-
-
84857196531
-
Esip: Secure incentive protocol with limited use of public-key cryptography for multi-hop wireless networks
-
M. Mahmoud and X. Shen, "Esip: Secure incentive protocol with limited use of public-key cryptography for multi-hop wireless networks," Mobile Computing, IEEE Transactions on, 2010.
-
(2010)
Mobile Computing, IEEE Transactions on
-
-
Mahmoud, M.1
Shen, X.2
-
10
-
-
79952149016
-
Reputation-based trust model in vehicular ad hoc networks
-
Q. Ding, X. Li, M. Jiang, and X. Zhou, "Reputation-based trust model in vehicular ad hoc networks," in Wireless Communications and Signal Processing (WCSP), 2010 International Conference on, 2010, pp. 1-6.
-
Wireless Communications and Signal Processing (WCSP), 2010 International Conference on, 2010
, pp. 1-6
-
-
Ding, Q.1
Li, X.2
Jiang, M.3
Zhou, X.4
-
11
-
-
70350238158
-
Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks
-
H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, "Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks," Vehicular Technology, IEEE Transactions on, vol. 58, no. 8, pp. 4628-4639, 2009.
-
(2009)
Vehicular Technology, IEEE Transactions on
, vol.58
, Issue.8
, pp. 4628-4639
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Fan, Y.4
Shen, X.5
-
12
-
-
77951292577
-
Pi: A practical incentive protocol for delay tolerant networks
-
R. Lu, X. Lin, H. Zhu, X. Shen, and B. Preiss, "Pi: A practical incentive protocol for delay tolerant networks," Wireless Communications, IEEE Transactions on, vol. 9, no. 4, pp. 1483-1493, 2010.
-
(2010)
Wireless Communications, IEEE Transactions on
, vol.9
, Issue.4
, pp. 1483-1493
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Shen, X.4
Preiss, B.5
-
13
-
-
67249083783
-
Incentive-aware routing in dtns
-
U. Shevade, H. H. Song, L. Qiu, and Y. Zhang, "Incentive-aware routing in dtns," in Network Protocols, 2008. ICNP 2008. IEEE International Conference on, 2008, pp. 238-247.
-
Network Protocols, 2008. ICNP 2008. IEEE International Conference on, 2008
, pp. 238-247
-
-
Shevade, U.1
Song, H.H.2
Qiu, L.3
Zhang, Y.4
-
14
-
-
84934300668
-
Computing cryptographic algorithms in portable and embedded devices
-
A. Ramachandran, Z. Zhou, and D. Huang, "Computing cryptographic algorithms in portable and embedded devices," in Portable Information Devices, 2007. PORTABLE07. IEEE International Conference on, May 2007, pp. 1-7.
-
Portable Information Devices, 2007. PORTABLE07. IEEE International Conference on, May 2007
, pp. 1-7
-
-
Ramachandran, A.1
Zhou, Z.2
Huang, D.3
-
15
-
-
33744913525
-
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
-
Internet and Network Economics - First International Workshop, WINE 2005, Proceedings
-
R. Zhu, G. Yang, and D. Wong, "An efficient identity-based key exchange protocol with kgs forward secrecy for low-power devices,"Internet and Network Economics, vol. 3828, pp. 500-509, 2005. (Pubitemid 43849288)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3828 LNCS
, pp. 500-509
-
-
Zhu, R.W.1
Yang, G.2
Wong, D.S.3
|