-
1
-
-
70449591671
-
Guest editorial body sensor networks: From theory to emerging applications
-
doi:10.1109/TITB.2009.2034564
-
Jovanov E, Poon CC, Yang GZ, Zhang YT (2009) Guest editorial body sensor networks: from theory to emerging applications. IEEE Trans Inf Technol Biomed 13(6):859-863. doi:10.1109/TITB.2009.2034564
-
(2009)
IEEE Trans Inf Technol Biomed
, vol.13
, Issue.6
, pp. 859-863
-
-
Jovanov, E.1
Poon, C.C.2
Yang, G.Z.3
Zhang, Y.T.4
-
2
-
-
59849115600
-
Body area sensor networks: Challenges and opportunities
-
doi:10.1109/MC.2009.5
-
Hanson MA, Powell HC, Barth AT, Ringgenberg K, Calhoun JH, Aylor Lach J (2009) Body area sensor networks: challenges and opportunities. Computer 42(1):58-65. doi:10.1109/MC.2009.5
-
(2009)
Computer
, vol.42
, Issue.1
, pp. 58-65
-
-
Hanson, M.A.1
Powell, H.C.2
Barth, A.T.3
Ringgenberg, K.4
Calhoun, J.H.5
Aylor Lach, J.6
-
3
-
-
77958520842
-
Security issues on wireless body area network for remote healthcare monitoring
-
Newport Beach, California, USA, June 7-9 doi:10.1109/SUTC.2010.61
-
Lim S, Oh TH, Choi YB, Lakshman T (2010) Security issues on wireless body area network for remote healthcare monitoring. 2010 IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, Newport Beach, California, USA, June 7-9, pp 327-332. doi:10.1109/SUTC.2010.61
-
(2010)
2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 327-332
-
-
Lim, S.1
Oh, T.H.2
Choi, Y.B.3
Lakshman, T.4
-
4
-
-
84860253312
-
Security and privacy issues in wireless sensor networks for healthcare applications
-
doi:10.1007/s10916-010-9449-4
-
Ameen M Al, Liu J, Kwak K (2010) Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst. doi:10.1007/s10916-010- 9449-4
-
(2010)
J Med Syst.
-
-
Al Ameen, M.1
Liu, J.2
Kwak, K.3
-
5
-
-
32944471696
-
The health insurance portability and accountability act of 1996 (HIPAA) privacy rule: Implications for clinical research
-
doi:10.1146/annurev.med.57.121304.131257
-
Nosowsky R, Giordano TJ (2006) The Health Insurance Portability and Accountability Act of 1996 (HIPAA) privacy rule: implications for clinical research. Annu Rev Med 57:575-590. doi:10.1146/annurev.med.57.121304.131257
-
(2006)
Annu Rev Med
, vol.57
, pp. 575-590
-
-
Nosowsky, R.1
Giordano, T.J.2
-
6
-
-
50249144555
-
-
Philadelphia, PA, USA, August 6-10 2007. doi:10.1109/MOBIQ. 2007.4451044
-
Xiao X, Sun X, Yang L, Chen M (2007) Secure data transmission of wireless sensor network based on information hiding. Fourth annual international conference on mobile and ubiquitous systems: networking & services (MobiQuitous 2007), Philadelphia, PA, USA, August 6-10, 1-6, 2007. doi:10.1109/MOBIQ. 2007.4451044
-
(2007)
Secure Data Transmission of Wireless Sensor Network Based on Information Hiding. Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous 2007)
, pp. 1-6
-
-
Xiao, X.1
Sun, X.2
Yang, L.3
Chen, M.4
-
7
-
-
77954415622
-
Bloom filter-based data hiding algorithm in wireless sensor networks
-
Busan, Korea, May 20-24 2010. doi:10.1109/FUTURETECH.2010.5482761
-
Yang J, Sun X, Wang B, Xiao X, Wang X, Luo D (2010) Bloom filter-based data hiding algorithm in wireless sensor networks. 5th international conference on future information technology (FutureTech), Busan, Korea, May 20-24, 1-6, 2010. doi:10.1109/FUTURETECH.2010.5482761
-
(2010)
5th International Conference on Future Information Technology (FutureTech)
, pp. 1-6
-
-
Yang, J.1
Sun, X.2
Wang, B.3
Xiao, X.4
Wang, X.5
Luo, D.6
-
8
-
-
77953501127
-
Privacy-preserving data aggregation protocols for wireless sensor networks: A survey
-
doi:10.3390/s100504577
-
Bista R, Chang JW (2010) Privacy-preserving data aggregation protocols for wireless sensor networks: a survey. Sensors 10(5):4577-4601. doi:10.3390/s100504577
-
(2010)
Sensors
, vol.10
, Issue.5
, pp. 4577-4601
-
-
Bista, R.1
Chang, J.W.2
-
9
-
-
84860762438
-
Security in wireless sensor network: A survey
-
Rathod VJ, Mehta M (2011) Security in wireless sensor network: a survey. Ganpat Univ J Eng Technol 1(1):35-44
-
(2011)
Ganpat Univ J Eng Technol
, vol.1
, Issue.1
, pp. 35-44
-
-
Rathod, V.J.1
Mehta, M.2
-
10
-
-
70849117519
-
Privacy-preserving integrity-assured data aggregation in sensor networks
-
Vancouver, Canada, August 29-31 2009. doi:10.1109/CSE. 2009.389
-
Taban G, Gligor VD (2009) Privacy-preserving integrity-assured data aggregation in sensor networks In: Proceeding of international symposium on secure computing (SecureCom), Vancouver, Canada, August 29-31, 168-175, 2009. doi:10.1109/CSE. 2009.389
-
(2009)
Proceeding of International Symposium on Secure Computing (SecureCom)
, pp. 168-175
-
-
Taban, G.1
Gligor, V.D.2
-
11
-
-
79952493402
-
A security framework for privacy-preserving data aggregation in wireless sensor networks
-
doi:10.1145/1921621.1921623
-
Chan ACF, Castelluccia C (2011) A security framework for privacy-preserving data aggregation in wireless sensor networks. ACM Trans Sensor Netw (TOSN) 7(4):29-73. doi:10.1145/1921621.1921623
-
(2011)
ACM Trans Sensor Netw (TOSN)
, vol.7
, Issue.4
, pp. 29-73
-
-
Chan, A.C.F.1
Castelluccia, C.2
-
12
-
-
84856665180
-
Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks
-
Ponomarchuk Y, Seo D-W (2010) Intrusion detection based on traffic analysis and fuzzy inference system in wireless sensor networks. J Conver 1(1):35-42
-
(2010)
J Conver
, vol.1
, Issue.1
, pp. 35-42
-
-
Ponomarchuk, Y.1
Seo, D.-W.2
-
13
-
-
84255215444
-
On secure communication in integrated heterogeneous wireless networks
-
Xie B, Kumar A, Zhao D, Reddy R, He B (2010) On secure communication in integrated heterogeneous wireless networks. Int J Inform Technol Commun Converg 1(1):4-23
-
(2010)
Int J Inform Technol Commun Converg
, vol.1
, Issue.1
, pp. 4-23
-
-
Xie, B.1
Kumar, A.2
Zhao, D.3
Reddy, R.4
He, B.5
-
14
-
-
84858132835
-
Hierarchical key derivation scheme for group-oriented communication systems
-
Wang S-J, Tsai Y-R, Shen C-C, Chen P-Y (2010) Hierarchical key derivation scheme for group-oriented communication systems. Int J Inform Technol Commun Converg 1(1):66-76
-
(2010)
Int J Inform Technol Commun Converg
, vol.1
, Issue.1
, pp. 66-76
-
-
Wang, S.-J.1
Tsai, Y.-R.2
Shen, C.-C.3
Chen, P.-Y.4
-
15
-
-
84867615498
-
Security enhanced communication in wireless sensor networks using reed-muller codes and partially balanced incomplete block designs
-
Sarkar P, Saha A (2011) Security enhanced communication in wireless sensor networks using reed-muller codes and partially balanced incomplete block designs. J Converg 2(1):23-30
-
(2011)
J Converg
, vol.2
, Issue.1
, pp. 23-30
-
-
Sarkar, P.1
Saha, A.2
-
16
-
-
78651280371
-
A secure pervasive health care system using location dependent unicast key generation scheme
-
Toronto, ON, Canada, October 26-30 2010. doi:10.1145/1871902.1871919
-
Acharya D, Kumar V (2010) A secure pervasive health care system using location dependent unicast key generation scheme. In: Proceedings of the 3rd workshop on Ph. D. students in information and knowledge management, Toronto, ON, Canada, October 26-30, pp 87-90, 2010. doi:10.1145/1871902.1871919
-
(2010)
Proceedings of the 3rd Workshop on Ph. D. Students in Information and Knowledge Management
, pp. 87-90
-
-
Acharya, D.1
Kumar, V.2
-
17
-
-
80053520387
-
Trust key management scheme for wireless body area networks
-
doi:ijns-2011-v12-n2-p84-91
-
Mana M, Feham M, Bensaber BA (2011) Trust key management scheme for wireless body area networks. Int J Netw Secur 12(2):75-83. doi:ijns-2011-v12-n2- p84-91
-
(2011)
Int J Netw Secur
, vol.12
, Issue.2
, pp. 75-83
-
-
Mana, M.1
Feham, M.2
Bensaber, B.A.3
-
18
-
-
67349253018
-
SAGE: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
-
doi:10.1109/JSAC.2009.090502
-
Lin X, Lu R, Shen X, Nemoto Y, Kato N (2009) SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE J Sel Areas Commun 27(4):365-378. doi: 10.1109/JSAC.2009.090502
-
(2009)
IEEE J Sel Areas Commun
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
19
-
-
70449562519
-
IBE-lite: A lightweight identity-based cryptography for body sensor networks
-
doi:10.1109/TITB.2009.2033055
-
Tan CC, Wang H, Zhong S, Li Q (2009) IBE-lite: a lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6):926-932. doi:10.1109/TITB. 2009.2033055
-
(2009)
IEEE Trans Inf Technol Biomed
, vol.13
, Issue.6
, pp. 926-932
-
-
Tan, C.C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
20
-
-
77951014466
-
Biometrics based novel key distribution solution for body sensor networks
-
Minneapolis, MN, USA, September 2-6 2009. doi:10.1109/IEMBS.2009. 5334698
-
Miao F, Jiang L, Li Y, Zhang YT (2009) Biometrics based novel key distribution solution for body sensor networks. Annual international conference of the IEEE engineering in medicine and biology society (EMBC 2009), Minneapolis, MN, USA, September 2-6, pp 2458-2461, 2009. doi:10.1109/IEMBS.2009. 5334698
-
(2009)
Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC 2009)
, pp. 2458-2461
-
-
Miao, F.1
Jiang, L.2
Li, Y.3
Zhang, Y.T.4
-
21
-
-
77953304550
-
Group device pairing based secure sensor association and key management for body area networks
-
San Diego, CA, USA, March 4-19 2010. doi:10.1109/INFCOM.2010.546 2095
-
Li M, Yu S, Lou W, Ren K (2010) Group device pairing based secure sensor association and key management for body area networks. In: Proceedings IEEE INFOCOM, San Diego, CA, USA, March 4-19, 1-9, 2010. doi:10.1109/INFCOM.2010.546 2095
-
(2010)
Proceedings IEEE INFOCOM
, pp. 1-9
-
-
Li, M.1
Yu, S.2
Lou, W.3
Ren, K.4
-
22
-
-
77954990804
-
Physiological value-based efficient usable security solutions for body sensor networks
-
doi:10.1145/1777406.1777410
-
Venkatasubramanian KK, Gupta SKS (2010) Physiological value-based efficient usable security solutions for body sensor networks. ACM Trans Sens Netw (TOSN) 6(4):1-36. doi:10.1145/1777406. 1777410
-
(2010)
ACM Trans Sens Netw (TOSN)
, vol.6
, Issue.4
, pp. 1-36
-
-
Venkatasubramanian, K.K.1
Gupta, S.K.S.2
-
23
-
-
79959839466
-
Authenticated key agreement with rekeying for secured body sensor networks
-
doi:10.3390/s110605835
-
Eldefrawy MH, Khan MK, Alghathbar K, Tolba AS, Kim KJ (2011) Authenticated key agreement with rekeying for secured body sensor networks. Sensors 11(6):5835-5849. doi:10.3390/s110605835
-
(2011)
Sensors
, vol.11
, Issue.6
, pp. 5835-5849
-
-
Eldefrawy, M.H.1
Khan, M.K.2
Alghathbar, K.3
Tolba, A.S.4
Kim, K.J.5
-
24
-
-
38449083733
-
Using packet combination in multi-query optimization for data collection in sensor networks
-
doi:10.1007/978-3-540-77024-4-59
-
Sun JZ (2007) Using packet combination in multi-query optimization for data collection in sensor networks. Mobile Ad-Hoc Sens Netw 4864:645-656. doi:10.1007/978-3-540-77024-4-59
-
(2007)
Mobile Ad-Hoc Sens Netw
, vol.4864
, pp. 645-656
-
-
Sun, J.Z.1
-
25
-
-
24744454159
-
A survey on data compression in wireless sensor networks
-
Las Vegas, Nevada, USA, April 4-6 2005. doi:10.1109/ITCC.2005.43
-
Kimura N, Latifi S (2005) A survey on data compression in wireless sensor networks. International conference on information technology: coding and computing (ITCC 2005), Las Vegas, Nevada, USA, April 4-6, 8-13, 2005. doi:10.1109/ITCC.2005.43
-
(2005)
International Conference on Information Technology: Coding and Computing (ITCC 2005)
, pp. 8-13
-
-
Kimura, N.1
Latifi, S.2
-
26
-
-
0034445661
-
System architecture directions for networked sensors
-
doi:10.1145/356989.356998
-
Hill J, Szewczyk R, Woo A, Hollar S, Culler D, Pister K (2000) System architecture directions for networked sensors. Acm Sigplan Notices 35(11):93-104. doi:10.1145/356989.356998
-
(2000)
Acm Sigplan Notices
, vol.35
, Issue.11
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
27
-
-
47749089325
-
From simulation to real deployments in wsn and back
-
Helsinki, Finland, June 18-21 2007. doi:10.1109/WOWMOM.2007.4351800
-
Pham HN, Pediaditakis D, Boulis A (2007) From simulation to real deployments in wsn and back. IEEE international symposium on a world of wireless, mobile and multimedia networks (WoWMoM2007), Helsinki, Finland, June 18-21, 1-6, 2007. doi: 10.1109/WOWMOM.2007.4351800
-
(2007)
IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM2007)
, pp. 1-6
-
-
Pham, H.N.1
Pediaditakis, D.2
Boulis, A.3
-
28
-
-
0033061976
-
Development of the polysomnographic database on CD-ROM
-
doi:10.1046/j.1440-1819.1999.00527.x
-
Ichimaru Y, Moody GB (1999) Development of the polysomnographic database on CD-ROM. Psychiatry Clin Neurosci 53(2):175-177. doi:10.1046/j.1440-1819.1999. 00527.x
-
(1999)
Psychiatry Clin Neurosci
, vol.53
, Issue.2
, pp. 175-177
-
-
Ichimaru, Y.1
Moody, G.B.2
|