-
1
-
-
33846234260
-
Development of a personal digital assistant-based wireless application in clinical practice
-
Chen Y, Chiu H, Tsai M, Chang H, Chong C. Development of a personal digital assistant-based wireless application in clinical practice. Computer Methods Programs Biomed 2007; 85 (2): 181-184.
-
(2007)
Computer Methods Programs Biomed
, vol.85
, Issue.2
, pp. 181-184
-
-
Chen, Y.1
Chiu, H.2
Tsai, M.3
Chang, H.4
Chong, C.5
-
2
-
-
35648980479
-
Using wireless handheld computers to seek information at the point of care: An evaluation by clinicians
-
Hauser ES, Demner-Fushman D, Jacobs LJ, Humphrey MS, Ford G, Thoma RG. Using wireless handheld computers to seek information at the point of care: an evaluation by clinicians. J Am Med Inform Assoc 2007; 14 (6): 807-815.
-
(2007)
J Am Med Inform Assoc
, vol.14
, Issue.6
, pp. 807-815
-
-
Hauser, E.S.1
Demner-Fushman, D.2
Jacobs, L.J.3
Humphrey, M.S.4
Ford, G.5
Thoma, R.G.6
-
3
-
-
44249097554
-
An open and reconfigurable wireless sensor network for pervasive health monitoring
-
Triantafyllidis A, Koutkias V, Chouvarda I, Magla-veras N. An open and reconfigurable wireless sensor network for pervasive health monitoring. Methods Inf Med 2008; 47 (3): 229-334.
-
(2008)
Methods Inf Med
, vol.47
, Issue.3
, pp. 229-334
-
-
Triantafyllidis, A.1
Koutkias, V.2
Chouvarda, I.3
Magla-Veras, N.4
-
4
-
-
33947512786
-
Mobile Nurse Platform for Ubiquitous Medicine
-
Struzik ZR, Yoshiuchi K, Sone M, Ishikawa T, Kiku-chi H, Kumano H, et al. "Mobile Nurse" Platform for Ubiquitous Medicine. Methods Inf Med 2007; 46 (2): 130-134.
-
(2007)
Methods Inf Med
, vol.46
, Issue.2
, pp. 130-134
-
-
Struzik, Z.R.1
Yoshiuchi, K.2
Sone, M.3
Ishikawa, T.4
Kiku-Chi, H.5
Kumano, H.6
-
5
-
-
84861311257
-
-
Ministry of Health, Labor and Welfare (Japan), Unofficial English translation is available at http://rylab.hcc.h.u-tokyo.ac.jp/guidelines.html
-
Ministry of Health, Labor and Welfare (Japan). Guidelines for the Security Management of Health Information Systems. Available at http://www.mhlw.go.jp/shingi/2010/02/s0202-4.html. Unofficial English translation is available at http://rylab. hcc.h.u-tokyo.ac.jp/guidelines.html.
-
Guidelines For the Security Management of Health Information Systems
-
-
-
7
-
-
33751253442
-
Access control protocols with two-layer architecture for wireless networks
-
Wan Z, Deng HR, Bao F, Ananda LA. Access control protocols with two-layer architecture for wireless networks. Computer Networks 2007; 51 (3): 655-670.
-
(2007)
Computer Networks
, vol.51
, Issue.3
, pp. 655-670
-
-
Wan, Z.1
Deng, H.R.2
Bao, F.3
Ananda, L.A.4
-
8
-
-
10644297048
-
From secure wired networks to secure wireless networks? what are the extra risks?
-
Solms B, Marais E. From secure wired networks to secure wireless networks? what are the extra risks? Computers & Security 2004; 23 (8): 633-637.
-
(2004)
Computers & Security
, vol.23
, Issue.8
, pp. 633-637
-
-
Solms, B.1
Marais, E.2
-
9
-
-
33645140577
-
Usability pitfalls in wireless LAN security
-
Furnell S, Ghita B. Usability pitfalls in wireless LAN security. Network Security 2006; 2006 (3): 4-8.
-
(2006)
Network Security
, vol.2006
, Issue.3
, pp. 4-8
-
-
Furnell, S.1
Ghita, B.2
-
10
-
-
25844445352
-
Modelling corporate wireless security and privacy
-
Katos V, Adams C. Modelling corporate wireless security and privacy. J Strategic Inform Systems 2005; 14 (3): 307-321.
-
(2005)
J Strategic Inform Systems
, vol.14
, Issue.3
, pp. 307-321
-
-
Katos, V.1
Adams, C.2
-
11
-
-
33751220510
-
Flexible and fast security solution for wireless LAN
-
Badra M, Urien P, Hajjeh I. Flexible and fast security solution for wireless LAN. Pervasive Mob Com-put 2007; 3 (1): 1-14.
-
(2007)
Pervasive Mob Com-put
, vol.3
, Issue.1
, pp. 1-14
-
-
Badra, M.1
Urien, P.2
Hajjeh, I.3
-
12
-
-
34548130719
-
Remote analysis of a distributed WLAN using passive wireless-side measurement
-
Mahanti A, Williamson C, Arlitt M. Remote analysis of a distributed WLAN using passive wireless-side measurement. Performance Evaluation 2007; 64 (9-12): 909-932.
-
(2007)
Performance Evaluation
, vol.64
, Issue.9-12
, pp. 909-932
-
-
Mahanti, A.1
Williamson, C.2
Arlitt, M.3
-
13
-
-
33746150390
-
Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
-
Sobh ST. Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art. Computer Standards & Interfaces 2006; 28(6): 670-694.
-
(2006)
Computer Standards & Interfaces
, vol.28
, Issue.6
, pp. 670-694
-
-
Sobh, S.T.1
-
14
-
-
0348170825
-
Rogue access points? threat to enterprise security
-
Potter B. Rogue access points? threat to enterprise security. Network Security 2003; 2003 (4): 4-5.
-
(2003)
Network Security
, vol.2003
, Issue.4
, pp. 4-5
-
-
Potter, B.1
-
15
-
-
36549043496
-
Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information
-
Liao I, Kao K. Enhancing the accuracy of WLAN-based location determination systems using predicted orientation information. Inf Sci 2008; 178 (4): 1049-1068.
-
(2008)
Inf Sci
, vol.178
, Issue.4
, pp. 1049-1068
-
-
Liao, I.1
Kao, K.2
-
16
-
-
63049132386
-
Detecting rogue access points using client-side bottleneck bandwidth analysis
-
Kao K, Liao I, Li Y. Detecting rogue access points using client-side bottleneck bandwidth analysis. Computers & Security 2009; 28 (3-4): 144-152.
-
(2009)
Computers & Security
, vol.28
, Issue.3-4
, pp. 144-152
-
-
Kao, K.1
Liao, I.2
Li, Y.3
-
17
-
-
36749028125
-
SMART-an integrated wireless system for monitoring unattended patients
-
Curtis WD, Pino JE, Bailey MJ, Shih IE, Waterman J, Vinterbo AS, et al. SMART-an integrated wireless system for monitoring unattended patients. J Am Med Inform Assoc 2008; 15 (1): 44-53.
-
(2008)
J Am Med Inform Assoc
, vol.15
, Issue.1
, pp. 44-53
-
-
Curtis, W.D.1
Pino, J.E.2
Bailey, M.J.3
Shih, I.E.4
Waterman, J.5
Vinterbo, A.S.6
|