-
1
-
-
77955298774
-
The internet of things for ambient assisted living
-
A. Dohr, R. Modre-Opsrian, M. Drobics, D. Hayn, and G. Schreier, "The internet of things for ambient assisted living," in Information Technology: New Generations (ITNG), 2010 Seventh International Conference on, april 2010, pp. 804-809.
-
Information Technology: New Generations (ITNG), 2010 Seventh International Conference on, April 2010
, pp. 804-809
-
-
Dohr, A.1
Modre-Opsrian, R.2
Drobics, M.3
Hayn, D.4
Schreier, G.5
-
2
-
-
78651278033
-
Visualization of data for ambient assisted living services
-
IEEE, january
-
M. Mulvenna, W. Carswell, P. Mccullagh, J. Augusto, H. Zheng, P. Jeffers, H. Wang, and S. Martin, "Visualization of data for ambient assisted living services," Communications Magazine, IEEE, vol. 49, no. 1, pp. 110-117, january 2011.
-
(2011)
Communications Magazine
, vol.49
, Issue.1
, pp. 110-117
-
-
Mulvenna, M.1
Carswell, W.2
Mccullagh, P.3
Augusto, J.4
Zheng, H.5
Jeffers, P.6
Wang, H.7
Martin, S.8
-
4
-
-
52149107120
-
Security, privacy and legal issues in pervasive ehealth monitoring systems
-
Proceedings of the 2008 7th International Conference on Mobile Business, ser. Washington, DC, USA: IEEE Computer Society, [Online]. Available
-
F. Kargl, E. Lawrence, M. Fischer, and Y. Y. Lim, "Security, privacy and legal issues in pervasive ehealth monitoring systems," in Proceedings of the 2008 7th International Conference on Mobile Business, ser. ICMB '08. Washington, DC, USA: IEEE Computer Society, 2008, pp. 296-304. [Online]. Available: http://dx.doi.org/10.1109/ICMB.2008.31
-
(2008)
ICMB '08
, pp. 296-304
-
-
Kargl, F.1
Lawrence, E.2
Fischer, M.3
Lim, Y.Y.4
-
5
-
-
67549118456
-
Secure data aggregation in wireless sensor networks: A comprehensive overview
-
[Online]. Available
-
S. Ozdemir and Y. Xiao, "Secure data aggregation in wireless sensor networks: A comprehensive overview," Computer Networks, vol. 53, no. 12, pp. 2022-2037, 2009. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S1389128609000863
-
(2009)
Computer Networks
, vol.53
, Issue.12
, pp. 2022-2037
-
-
Ozdemir, S.1
Xiao, Y.2
-
6
-
-
84861997111
-
Internet of things: Vision, applications and research challenges
-
[Online]. Available
-
D. Miorandi, S. Sicari, F. D. Pellegrini, and I. Chlamtac, "Internet of things: Vision, applications and research challenges," Ad Hoc Networks, vol. 10, no. 7, pp. 1497-1516, 2012. [Online]. Available: http://www. sciencedirect.com/science/article/pii/S1570870512000674
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
Pellegrini, F.D.3
Chlamtac, I.4
-
7
-
-
34047093851
-
Trust negotiation in identity management
-
IEEE, march-april
-
A. Bhargav-Spantzel, A. Squicciarini, and E. Bertino, "Trust negotiation in identity management," Security Privacy, IEEE, vol. 5, no. 2, pp. 55-63, march-april 2007.
-
(2007)
Security Privacy
, vol.5
, Issue.2
, pp. 55-63
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.2
Bertino, E.3
-
9
-
-
18144428307
-
Securedav: A secure data aggregation and verification protocol for sensor networks
-
IEEE, nov.-3 dec. Vol.4
-
A. Mahimkar and T. Rappaport, "Securedav: a secure data aggregation and verification protocol for sensor networks," in Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE, vol. 4, nov.-3 dec. 2004, pp. 2175-2179 Vol.4.
-
(2004)
Global Telecommunications Conference, 2004. GLOBECOM '04
, vol.4
, pp. 2175-2179
-
-
Mahimkar, A.1
Rappaport, T.2
-
10
-
-
18844457825
-
Sia: Secure information aggregation in sensor networks
-
Proceedings of the 1st international conference on Embedded networked sensor systems, ser. New York, NY, USA: ACM, [Online]. Available
-
B. Przydatek, D. Song, and A. Perrig, "Sia: secure information aggregation in sensor networks," in Proceedings of the 1st international conference on Embedded networked sensor systems, ser. SenSys '03. New York, NY, USA: ACM, 2003, pp. 255-265. [Online]. Available: http://doi.acm.org/10.1145/ 958491.958521
-
(2003)
SenSys '03
, pp. 255-265
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
11
-
-
47249114835
-
Sedan: Secure and efficient protocol for data aggregation in wireless sensor networks
-
vol. 0
-
M. Bagaa, N. Lasla, A. Ouadjaout, and Y. Challal, "Sedan: Secure and efficient protocol for data aggregation in wireless sensor networks," Local Computer Networks, Annual IEEE Conference on, vol. 0, pp. 1053-1060, 2007.
-
(2007)
Local Computer Networks, Annual IEEE Conference on
, pp. 1053-1060
-
-
Bagaa, M.1
Lasla, N.2
Ouadjaout, A.3
Challal, Y.4
-
12
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient aggregation of encrypted data in wireless sensor networks," in Mobile and Ubiquitous Systems: Networking and Services, 2005. MobiQuitous 2005. The Second Annual International Conference on, july 2005, pp. 109-117.
-
Mobile and Ubiquitous Systems: Networking and Services, 2005. MobiQuitous 2005. The Second Annual International Conference on, July 2005
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
13
-
-
24144459865
-
Cda: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
-
may Vol. 5
-
J. Girao, D. Westhoff, and M. Schneider, "Cda: concealed data aggregation for reverse multicast traffic in wireless sensor networks," in Communications, 2005. ICC 2005. 2005 IEEE International Conference on, vol. 5, may 2005, pp. 3044-3049 Vol. 5.
-
(2005)
Communications, 2005. ICC 2005. 2005 IEEE International Conference on
, vol.5
, pp. 3044-3049
-
-
Girao, J.1
Westhoff, D.2
Schneider, M.3
-
14
-
-
74549202899
-
Secure aggregation in hybrid mesh/sensor networks
-
R. Riggio and S. Sicari, "Secure aggregation in hybrid mesh/sensor networks," in Ultra Modern Telecommunications Workshops, 2009. ICUMT '09. International Conference on, oct. 2009, pp. 1-6.
-
Ultra Modern Telecommunications Workshops, 2009. ICUMT '09. International Conference on, Oct. 2009
, pp. 1-6
-
-
Riggio, R.1
Sicari, S.2
-
15
-
-
80755190141
-
Dydap: A dynamic data aggregation scheme for privacy aware wireless sensor networks
-
¡ce:title¿Dynamic Analysis and Testing of Embedded Software¡/ce:title¿. [Online]. Available
-
S. Sicari, L. A. Grieco, G. Boggia, and A. Coen-Porisini, "Dydap: A dynamic data aggregation scheme for privacy aware wireless sensor networks," Journal of Systems and Software, vol. 85, no. 1, pp. 152-166, 2012, ¡ce:title¿Dynamic Analysis and Testing of Embedded Software¡/ce:title¿. [Online]. Available: http://www.sciencedirect. com/science/article/pii/S0164121211002068
-
(2012)
Journal of Systems and Software
, vol.85
, Issue.1
, pp. 152-166
-
-
Sicari, S.1
Grieco, L.A.2
Boggia, G.3
Coen-Porisini, A.4
-
16
-
-
84872838789
-
Sedap: Secure data aggregation protocol in privacy aware wireless sensor networks
-
Sensor Systems and Software, ser. G. Par and P. Morrow, Eds. Springer Berlin Heidelberg, [Online]. Available
-
A. Coen Porisini and S. Sicari, "Sedap: Secure data aggregation protocol in privacy aware wireless sensor networks," in Sensor Systems and Software, ser. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, G. Par and P. Morrow, Eds. Springer Berlin Heidelberg, 2011, vol. 57, pp. 135-150. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-23583-2 10
-
(2011)
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.57
, pp. 135-150
-
-
Coen Porisini, A.1
Sicari, S.2
-
17
-
-
42549159545
-
Public key based cryptoschemes for data concealment in wireless sensor networks
-
june
-
E. Mykletun, J. Girao, and D. Westhoff, "Public key based cryptoschemes for data concealment in wireless sensor networks," in Communications, 2006. ICC '06. IEEE International Conference on, vol. 5, june 2006, pp. 2288-2295.
-
(2006)
Communications, 2006. ICC '06. IEEE International Conference on
, vol.5
, pp. 2288-2295
-
-
Mykletun, E.1
Girao, J.2
Westhoff, D.3
-
18
-
-
79955712919
-
Key management systems for sensor networks in the context of the internet of things
-
¡ce:title¿Modern Trends in Applied Security: Architectures, Implementations and Applications¡/ce:title¿. [Online]. Available
-
R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos, "Key management systems for sensor networks in the context of the internet of things," Computers & Electrical Engineering, vol. 37, no. 2, pp. 147-159, 2011, ¡ce:title¿Modern Trends in Applied Security: Architectures, Implementations and Applications¡/ce:title¿. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0045790611000176
-
(2011)
Computers & Electrical Engineering
, vol.37
, Issue.2
, pp. 147-159
-
-
Roman, R.1
Alcaraz, C.2
Lopez, J.3
Sklavos, N.4
-
19
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, ser. New York, NY, USA: ACM, [Online]. Available
-
K. Piotrowski, P. Langendoerfer, and S. Peter, "How public key cryptography influences wireless sensor node lifetime," in Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, ser. SASN '06. New York, NY, USA: ACM, 2006, pp. 169-176. [Online]. Available: http://doi.acm.org/10.1145/1180345.1180366
-
(2006)
SASN '06
, pp. 169-176
-
-
Piotrowski, K.1
Langendoerfer, P.2
Peter, S.3
-
23
-
-
84857152674
-
Managing wearable sensor data through cloud computing
-
C. Doukas and I. Maglogiannis, "Managing wearable sensor data through cloud computing," in Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on, 29 2011- dec. 1 2011, pp. 440-445.
-
Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on, 29 2011- Dec. 1 2011
, pp. 440-445
-
-
Doukas, C.1
Maglogiannis, I.2
|