-
1
-
-
79960852180
-
Bodyt2: Throughput and time delay performance assurance for heterogeneous bsns
-
Z. Ren, G. Zhou, A. Pyles, M. Keally, W. Mao, and H. Wang, "Bodyt2: Throughput and time delay performance assurance for heterogeneous bsns," in Proc. IEEE INFOCOM, 2011, pp. 2750-2758.
-
Proc. IEEE INFOCOM, 2011
, pp. 2750-2758
-
-
Ren, Z.1
Zhou, G.2
Pyles, A.3
Keally, M.4
Mao, W.5
Wang, H.6
-
2
-
-
70450247015
-
Link layer behavior of body area networks at 2.4 ghz
-
A. Natarajan, B. de Silva, K.-K. Yap, and M. Motani, "Link layer behavior of body area networks at 2.4 ghz," in MOBICOM, 2009, pp. 241-252.
-
(2009)
MOBICOM
, pp. 241-252
-
-
Natarajan, A.1
De Silva, B.2
Yap, K.-K.3
Motani, M.4
-
3
-
-
84855798732
-
A comprehensive survey of wireless body area networks
-
10.1007/s10916-010-9571-3
-
S. Ullah, H. Higgins, B. Braem, B. Latre, C. Blondia, I. Moerman, S. Saleem, Z. Rahman, and K. Kwak, "A comprehensive survey of wireless body area networks," Journal of Medical Systems, pp. 1-30, 10.1007/s10916-010- 9571-3.
-
Journal of Medical Systems
, pp. 1-30
-
-
Ullah, S.1
Higgins, H.2
Braem, B.3
Latre, B.4
Blondia, C.5
Moerman, I.6
Saleem, S.7
Rahman, Z.8
Kwak, K.9
-
4
-
-
79951723271
-
A survey on wireless body area networks
-
B. Latre, B. Braem, I. Moennan, C. Blondia, and P. Demeester, "A survey on wireless body area networks," Journal of Wireless Networks, vol. 17, pp. 1-18, 2011.
-
(2011)
Journal of Wireless Networks
, vol.17
, pp. 1-18
-
-
Latre, B.1
Braem, B.2
Moennan, I.3
Blondia, C.4
Demeester, P.5
-
5
-
-
35548957371
-
Investigating network architectures for body sensor networks
-
A. Natarajan, M. Motani, B. de Silva, K.-K. Yap, and K. C. Chua, "Investigating network architectures for body sensor networks," in HealthNet, 2007, pp. 19-24.
-
(2007)
HealthNet
, pp. 19-24
-
-
Natarajan, A.1
Motani, M.2
De Silva, B.3
Yap, K.-K.4
Chua, K.C.5
-
6
-
-
67349253018
-
Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
-
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems," IEEE Journal on Selected Areas in Communication, vol. 27, no. 4, pp. 365-378, 2009.
-
(2009)
IEEE Journal on Selected Areas in Communication
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
7
-
-
79956315983
-
Pec: A privacy-preserving emergency call scheme for mobile healthcare social networks
-
X. Liang, L. Chen, R. Lu, X. Lin, and X. Shen, "Pec : A privacy-preserving emergency call scheme for mobile healthcare social networks,"IEEEIK/CSJ. Commu. and Networks (JCN) , vol. 13 , no. 2, pp. 102-112, 2011.
-
(2011)
IEEEIK/CSJ. Commu. and Networks (JCN)
, vol.13
, Issue.2
, pp. 102-112
-
-
Liang, X.1
Chen, L.2
Lu, R.3
Lin, X.4
Shen, X.5
-
8
-
-
84857223961
-
Pseudonym changing at social spots: An effective strategy for location privacy in vanets
-
preprint
-
R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, "Pseudonym changing at social spots : An effective strategy for location privacy in vanets," IEEE Transactions on Vehicular Technology, 2011, preprint.
-
(2011)
IEEE Transactions on Vehicular Technology
-
-
Lu, R.1
Lin, X.2
Luan, H.3
Liang, X.4
Shen, X.5
-
9
-
-
79956044545
-
Mobility prediction based neighborhood discovery in mobile ad hoc networks
-
X. Li, N. Mitton, and D. Simplot-Ryl, "Mobility prediction based neighborhood discovery in mobile ad hoc networks," in Networking (1), 2011, pp. 241 -253.
-
(2011)
Networking
, Issue.1
, pp. 241-253
-
-
Li, X.1
Mitton, N.2
Simplot-Ryl, D.3
-
10
-
-
50249125456
-
A low-delay protocol for multihop wireless body area networks
-
B. Latre, B. Braem, I. Moerman, C. Blondia, E. Reusens, W. Joseph, and P. Demeester, "A low-delay protocol for multihop wireless body area networks," in Proc. of 4th International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2007, pp. 1-8.
-
Proc. of 4th International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2007
, pp. 1-8
-
-
Latre, B.1
Braem, B.2
Moerman, I.3
Blondia, C.4
Reusens, E.5
Joseph, W.6
Demeester, P.7
-
11
-
-
77956382553
-
Transmission power assignment with postural position inference for on-body wireless communication links
-
M. Quwaider, J. Rao, and S. Biswas, "Transmission power assignment with postural position inference for on-body wireless communication links," ACM Trans. Embedded Comput. Syst., vol. 10, no. 1, 2010.
-
(2010)
ACM Trans. Embedded Comput. Syst.
, vol.10
, Issue.1
-
-
Quwaider, M.1
Rao, J.2
Biswas, S.3
-
12
-
-
77954034169
-
Dtn routing in body sensor networks with dynamic postural partitioning
-
M. Quwaider and S. Biswas, "Dtn routing in body sensor networks with dynamic postural partitioning," Ad Hoc Networks, vol. 8, no. 8, pp. 824-841, 2010.
-
(2010)
Ad Hoc Networks
, vol.8
, Issue.8
, pp. 824-841
-
-
Quwaider, M.1
Biswas, S.2
-
13
-
-
79251633206
-
Modeling on-body dtn packet routing delay in the presence of postural disconnections
-
280324
-
M. Quwaider, M. Taghizadeh, and S. Biswas, "Modeling on-body dtn packet routing delay in the presence of postural disconnections,"EURASIP Journal on Wireless Communications and Networking, vol. 2011, no. 280324, pp. 1-19, 2010.
-
(2010)
EURASIP Journal on Wireless Communications and Networking
, vol.2011
, pp. 1-19
-
-
Quwaider, M.1
Taghizadeh, M.2
Biswas, S.3
-
15
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. K. Franklin, "Identity-based encryption from the weil pairing," in CRYPTO, 2001 , pp. 213-229.
-
(2001)
CRYPTO
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
16
-
-
77953304550
-
Group device pairing based secure sensor association and key management for body area networks
-
M. Li, S. Yu, W. Lou, and K. Ren, "Group device pairing based secure sensor association and key management for body area networks," in Proc. IEEE INFOCOM, 2010, pp. 2651-2659.
-
Proc. IEEE INFOCOM, 2010
, pp. 2651-2659
-
-
Li, M.1
Yu, S.2
Lou, W.3
Ren, K.4
-
17
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
F. Hess, "Efficient identity based signature schemes based on pairings,"in Selected Areas in Cryptography, 2002, pp. 310-324.
-
(2002)
Selected Areas in Cryptography
, pp. 310-324
-
-
Hess, F.1
-
18
-
-
70450244596
-
-
IEEE 802. 15-08-0416-04-0006
-
T. Aoyagi, J. Takada, K. Takizawa, N. Katayama, T. Kobayashi, K. Y. Yazdandoost, H. Li, and R. Kohno, "Channel model for wearable and implantable wbans," IEEE 802. 15-08-0416-04-0006, 2008.
-
(2008)
Channel Model for Wearable and Implantable Wbans
-
-
Aoyagi, T.1
Takada, J.2
Takizawa, K.3
Katayama, N.4
Kobayashi, T.5
Yazdandoost, K.Y.6
Li, H.7
Kohno, R.8
-
19
-
-
70449567214
-
Energy-efficient low duty cycle mac protocol for wireless body area networks
-
S. J. Marinkovic, E. M. Popovici, C. Spagnol, S. Faul, and W. P. Mamane, "Energy-efficient low duty cycle mac protocol for wireless body area networks," IEEE Transactions on Information Technology in Biomedicine, vol. 13, no. 6, pp. 915-925, 2009.
-
(2009)
IEEE Transactions on Information Technology in Biomedicine
, vol.13
, Issue.6
, pp. 915-925
-
-
Marinkovic, S.J.1
Popovici, E.M.2
Spagnol, C.3
Faul, S.4
Mamane, W.P.5
|