-
1
-
-
0141499236
-
Enhancing quality of life through wearable technology
-
Park, S. and Jayaraman, S. (2003) Enhancing quality of life through wearable technology. IEEE Eng. Biol. Mag., 22, 41-48
-
(2003)
IEEE Eng. Biol. Mag
, vol.22
, pp. 41-48
-
-
Park, S.1
Jayaraman, S.2
-
2
-
-
84897419718
-
Sensors and wireless communication for medical care database and expert system applications
-
Prague, Czech Republic, September 1-5 IEEE Computer Society, Washington, DC, USA
-
Bhargava, A. and Zoltowski, M. (2003) Sensors and Wireless Communication for Medical Care Database and Expert System Applications. Proc. DEXA?03, Prague, Czech Republic, September 1-5, pp. 956-960. IEEE Computer Society, Washington, DC, USA
-
(2003)
Proc. DEXA?03
, pp. 956-960
-
-
Bhargava, A.1
Zoltowski, M.2
-
3
-
-
84860253312
-
Security and privacy issues in wireless sensor networks for healthcare applications
-
Ameen, M.A. and Liu, J. (2012) Security and privacy issues in wireless sensor networks for healthcare applications. Med. Syst. J., 36, 93-101
-
(2012)
Med. Syst. J.
, vol.36
, pp. 93-101
-
-
Ameen, M.A.1
Liu, J.2
-
4
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V. and Culler, V. (2008) SPINS: Security protocols for sensor networks. Wirel. Netw. J., 8, 521-534
-
(2008)
Wirel. Netw. J.
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, V.5
-
5
-
-
84939435969
-
Biosec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body
-
Kaohsiung, Taiwan, October 6-9 IEEE Computer Society, Washington, DC, USA
-
Cherkuri, S., Venkatasuubramanian, K.K. and Gupta, S.K.S. (2003) BioSec: A biometric based approach for securing communication in wireless networks of biosensors implanted in the human body. Proc. ICPPW?03, Kaohsiung, Taiwan, October 6-9, pp. 432-439. IEEE Computer Society, Washington, DC, USA
-
(2003)
Proc. ICPPW?03
, pp. 432-439
-
-
Cherkuri, S.1
Venkatasuubramanian, K.K.2
Gupta, S.K.S.3
-
6
-
-
33645991463
-
-
Harvard University
-
Shnayder, V., Chen, B., Lorincz, K., Fulford-Jones, T.R.F. and Welsh, M. (2005) Sensor Networks for Medical Care, TR-08-05. Division of Engineering and Applied Sciences, Harvard University, http://www.eecs.harvard.edu/~mdw/proj/ codeblue
-
(2005)
Sensor Networks for Medical Care TR- 08-05. Division of Engineering and Applied Sciences
-
-
Shnayder, V.1
Chen, B.2
Lorincz, K.3
Fulford-Jones, T.R.F.4
Welsh, M.5
-
7
-
-
34548134027
-
I-living: An open system architecture forassisted living
-
Taipei,Taiwan October 8-11 IEEE Computer Society,Washington, DC, USA
-
Wang, Q. et al. (2006) I-LIVING: An Open System Architecture forAssisted Living. Proc. SMC?06,Taipei,Taiwan, October 8-11, pp. 4268-7275, IEEE Computer Society,Washington, DC, USA
-
(2006)
Proc. SMC?06
, pp. 4268-7275
-
-
Wang, Q.1
-
8
-
-
45849120977
-
Alarmnet: Wireless sensor network for assisted living and health monitoring cs- 2006-01
-
University of Virginia, USA
-
Wood, A., Virone, G., Doan, T., Cao, Q., Selavo, L., Wu, Y., Fang, L., He, Z., Lin, S. and Stankovic, J. (2006) ALARMNET: Wireless Sensor Network for Assisted Living and Health Monitoring, CS-2006-01. Department of Computer Science, University of Virginia, USA
-
(2006)
Department of Computer Science
-
-
Wood, A.1
Virone, G.2
Doan, T.3
Cao, Q.4
Selavo, L.5
Wu, Y.6
Fang, L.7
He, Z.8
Lin, S.9
Stankovic, J.10
-
9
-
-
35549002780
-
Addressing security in medical sensor networks
-
San Juan, PR, USA, June 11 ACM, NewYork, NY, USA
-
Malasri, K. andWang, L. (2007) Addressing Security in Medical Sensor Networks. Proc. HealthNet?07, San Juan, PR, USA, June 11, pp. 7-12. ACM, NewYork, NY, USA
-
(2007)
Proc. HealthNet?07
, pp. 7-12
-
-
Malasri, K.1
Wang, L.2
-
10
-
-
35948930628
-
Security solution for data integrity in wireless biosensor networks
-
Toronto, Canada, June IEEE Computer Society,Washington, DC, USA
-
Balasubramanyan, V.B., Thamilarasu, G. and Sridhar, R. (2007) Security Solution for Data Integrity in Wireless Biosensor Networks. Proc. ICDCSW?07, Toronto, Canada, June 22-29. IEEE Computer Society,Washington, DC, USA
-
(2007)
Proc. ICDCSW?07
, pp. 22-29
-
-
Balasubramanyan, V.B.1
Thamilarasu, G.2
Sridhar, R.3
-
11
-
-
67649356823
-
Wireless sensor network for wearable physiological monitoring
-
Pandian, P.S., Safeer, K.P., Gupta, P., Sankunthala, D.T., Sundersheshu, B.S. and Padaki, V.C. (2008) Wireless sensor network for wearable physiological monitoring. J. Netw., 3, 21-29
-
(2008)
J. Netw
, vol.3
, pp. 21-29
-
-
Pandian, P.S.1
Safeer, K.P.2
Gupta, P.3
Sankunthala, D.T.4
Sundersheshu, B.S.5
Padaki, V.C.6
-
12
-
-
84897413231
-
-
http://www.hackerhalted.com/2011/
-
-
-
-
13
-
-
79957984376
-
A framework for specifying safe behavior of the CIIP medical system, advances in experimental medicine and biology
-
Babamir, S.M. (2011) A framework for specifying safe behavior of the CIIP medical system, advances in experimental medicine and biology. J. Softw. Tools Algorithms Biol. Syst., 696, 637-644
-
(2011)
J. Softw. Tools Algorithms Biol. Syst
, vol.696
, pp. 637-644
-
-
Babamir, S.M.1
-
14
-
-
84863221395
-
Constructing a model-based software monitor for the insulin pump behavior
-
Babamir, S.M. (2012) Constructing a model-based software monitor for the insulin pump behavior. J. Med. Syst., 36, 829-840
-
(2012)
J. Med. Syst
, vol.36
, pp. 829-840
-
-
Babamir, S.M.1
-
15
-
-
84863221395
-
Formal verification of medical monitoring software using Z language: A representative sample
-
Babamir, S.M. and Borhani, M. (2012) Formal verification of medical monitoring software using Z language: A representative sample. J. Med. Syst., 36, 829-840
-
(2012)
J. Med. Syst
, vol.36
, pp. 829-840
-
-
Babamir, S.M.1
Borhani, M.2
-
16
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature&encryption) cost (signature) + cost (encryption
-
Santa Barbara, CA, USA, August 17-21 Springer, Berlin
-
Zheng, Y. (1997) Digital Signcryption or How to Achieve Cost (signature&encryption)Cost (signature) + Cost (encryption). Proc. Crypto?97, Santa Barbara, CA, USA, August 17-21, pp. 165-179. Springer, Berlin
-
(1997)
Proc. Crypto?97
, pp. 165-179
-
-
Zheng, Y.1
-
18
-
-
35048859269
-
Efficient signcryption with key privacy from gap diffie-hellman groups
-
Singapore, Malaysia, March 1-4 Springer, Berlin
-
Libert, B. and Quisquater, J.J. (2004) Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. Proc. PKC?04, Singapore, Malaysia, March 1-4, pp. 187-200. Springer, Berlin
-
(2004)
Proc. PKC?04
, pp. 187-200
-
-
Libert, B.1
Quisquater, J.J.2
-
19
-
-
35048854673
-
Efficient forward and provably secure id-based signcryption scheme with public verifiability and public ciphertext authenticity
-
Seoul, Korea, November 27-28 Springer, Berlin
-
Chow, S.S.M., Yiu, S.M., Hui, L.C.K. and Chow, K.P. (2004) Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. Proc. ICISC?03, Seoul, Korea, November 27-28, pp. 352-369. Springer, Berlin
-
(2004)
Proc. ICISC?03
, pp. 352-369
-
-
Chow, S.S.M.1
Yiu, S.M.2
Hui, L.C.K.3
Chow, K.P.4
-
20
-
-
35248874429
-
Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptology
-
Santa Barbara, CA, USA, August 17-21 Springer, Berlin
-
Boyen, X. (2003) Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptology. Proc. CRYPTO?03, Santa Barbara, CA, USA, August 17-21, pp. 383-399. Springer, Berlin
-
(2003)
Proc. CRYPTO?03
, pp. 383-399
-
-
Boyen, X.1
-
21
-
-
24144498013
-
Improved identity-based signcryption
-
Les Diablerets, Switzerland, January 23-26 Springer, Berlin
-
Chen, L. and Malone-Lee, J. (2005) Improved Identity-Based Signcryption. Proc. PKC?05, Les Diablerets, Switzerland, January 23-26, pp. 362-379. Springer, Berlin
-
(2005)
Proc. PKC?05
, pp. 362-379
-
-
Chen, L.1
Malone-Lee, J.2
-
22
-
-
33646820668
-
Efficient and provably-secure identity based signcryption from bilinear maps
-
Chennai (Madras) India, December 4-8 Springer, Berlin
-
Barreto, P.S.L.M., Libert, B., McCullagh N. and Quisquater, J.J. (2005) Efficient and Provably-Secure Identity Based Signcryption from Bilinear Maps. Proc. ASIACRYPT?05, Chennai (Madras), India, December 4-8, pp. 515-532. Springer, Berlin
-
(2005)
Proc. ASIACRYPT?05
, pp. 515-532
-
-
Barreto, P.S.L.M.1
Libert, B.2
McCullagh, N.3
Quisquater, J.J.4
-
23
-
-
54349101206
-
Identity based signcryption scheme without random
-
Yu, Y., Yang, B., Sun, Y. and Zhu, S. (2009) Identity based signcryption scheme without random oracles. Comput. Stand. Interfaces J., 31, 56-62
-
(2009)
Oracles. Comput. Stand. Interfaces J.
, vol.31
, pp. 56-62
-
-
Yu, Y.1
Yang, B.2
Sun, Y.3
Zhu, S.4
-
24
-
-
77950628145
-
An improved semanticallysecure identity-based signcryption scheme in the standard model
-
Jin, Z., Wen, Q. and Du, H. (2010) An improved semanticallysecure identity-based signcryption scheme in the standard model. J. Comput. Electr. Eng., 36, 545-552
-
(2010)
J. Comput. Electr. Eng
, vol.36
, pp. 545-552
-
-
Jin, Z.1
Wen, Q.2
Du, H.3
-
25
-
-
77956318476
-
An efficient identity-based signcryption scheme for multiple receivers
-
Toyama, Japan, October 28-30 Springer, Berlin
-
Selvi, S., Vivek, S., Srinivasan, R. and Rangan, C. (2009) An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. Proc. IWSEC?09, Toyama, Japan, October 28-30, pp. 71-88. Springer, Berlin
-
(2009)
Proc. IWSEC?09
, pp. 71-88
-
-
Selvi, S.1
Vivek, S.2
Srinivasan, R.3
Rangan, C.4
-
26
-
-
84862664924
-
Efficient generalized signcryption schemes
-
Kushwah, P. and Lal, S. (2011) Efficient generalized signcryption schemes. Theor. Comput. Sci. J., 412, 6382-6389
-
(2011)
Theor. Comput. Sci. J.
, vol.412
, pp. 6382-6389
-
-
Kushwah, P.1
Lal, S.2
-
27
-
-
79958742506
-
A survey of identity based signcryption
-
Liu, F. and Khan, M.K. (2011) A survey of identity based signcryption. IETE Tech. Rev. J., 28, 256-272
-
(2011)
IETE Tech. Rev. J.
, vol.28
, pp. 256-272
-
-
Liu, F.1
Khan, M.K.2
-
28
-
-
24944566040
-
Efficient identity based encryption without random oracles
-
Aarhus, Denmark, May 22-26 Springer, Berlin
-
Waters, B. (2005) Efficient Identity Based Encryption Without Random Oracles. Proc. EUROCRYPT?05, Aarhus, Denmark, May 22-26, pp. 114-127. Springer, Berlin
-
(2005)
Proc. EUROCRYPT?05
, pp. 114-127
-
-
Waters, B.1
-
29
-
-
33746372179
-
Efficient identity based signature secure in the standard model
-
Melbourne, Australia, July 3-5 Springer, Berlin
-
Paterson, K.G. and Schuldt, J.C.N. (2006) Efficient Identity Based Signature Secure in the Standard Model. Proc. ACISP?06, Melbourne, Australia, July 3-5, pp. 207-222. Springer, Berlin
-
(2006)
Proc. ACISP?06
, pp. 207-222
-
-
Paterson, K.G.1
Schuldt, J.C.N.2
-
32
-
-
33749408128
-
-
Institute of Telematics, University of Karlsruhe Zirkel 2, D-76128 Karlsruhe, Germany
-
Blab, E. and Zitterbart, M. (2005) Efficient Implementation of Elliptic Curve Cryptography forWireless Sensor Network, TM-2005-1. Institute of Telematics, University of Karlsruhe Zirkel 2, D-76128 Karlsruhe, Germany
-
(2005)
Efficient Implementation of Elliptic Curve Cryptography forWireless Sensor Network TM-2005-1
-
-
Blab, E.1
Zitterbart, M.2
-
33
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
Santa Barbara, CA, USA, August 19-22 Springer, NewYork, NY, USA
-
Shamir, A. (1984) Identity Based Cryptosystems and Signature Schemes. Proc. Crypto? 84, Santa Barbara, CA, USA, August 19-22, pp. 47-53. Springer, NewYork, NY, USA
-
(1984)
Proc. Crypto? 84
, pp. 47-53
-
-
Shamir, A.1
-
34
-
-
84870718896
-
Data security in unattended wireless sensor networks through aggregate signcryption
-
Babamir, F.S. and Eslami, Z. (2012) Data security in unattended wireless sensor networks through aggregate signcryption. KSII Trans. Internet Inf. Syst., 9, 287-296
-
(2012)
KSII Trans. Internet Inf. Syst
, vol.9
, pp. 287-296
-
-
Babamir, F.S.1
Eslami, Z.2
-
35
-
-
77955088735
-
Efficient online/offline identity based signature for wireless sensor network
-
Liu, J.K., Beak, J., Zhou, J., Yang, Y. and Wong, J.W. (2012) Efficient online/offline identity based signature for wireless sensor network. Int. J. Secur., 9, 287-296
-
(2012)
Int. J. Secur
, vol.9
, pp. 287-296
-
-
Liu, J.K.1
Beak, J.2
Zhou, J.3
Yang, Y.4
Wong, J.W.5
-
36
-
-
65249138169
-
A new adversary and threats: Security in unattended wireless sensor networks
-
Ma, D., Soriente, C. and Tsudik, G. (2009)A new adversary and threats: Security in unattended wireless sensor networks. IEEE Netw. J., 23, 43-48
-
(2009)
IEEE Netw. J.
, vol.23
, pp. 43-48
-
-
Ma, D.1
Soriente, C.2
Tsudik, G.3
-
37
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Santa Barbara, CA, USA, August 27-31, Lecture Notes in Computer Science 963 Springer, London, UK.
-
Herzberg, A., Jarecki, S., Krawczyk, H. and Yung, M. (1995) Proactive Secret Sharing or: How to Cope with Perpetual Leakage. Proc. CRYPTO?95, Santa Barbara, CA, USA, August 27-31, Lecture Notes in Computer Science 963, pp. 339-352. Springer, London, UK.
-
(1995)
Proc. CRYPTO?95
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
38
-
-
33847255502
-
A practical study of transitory master key establishment for wireless sensor networks
-
Athens, Greece, September 5-9 IEEE Computer Society, Washington, DC, USA
-
Deng, J., Hartung, C., Han, R. and Mishra, S. (2005) A Practical Study of Transitory Master Key Establishment for Wireless Sensor Networks. Proc. SecureComm?05, Athens, Greece, September 5-9, pp. 289-302. IEEE Computer Society, Washington, DC, USA
-
(2005)
Proc. Secure Comm?05
, pp. 289-302
-
-
Deng, J.1
Hartung, C.2
Han, R.3
Mishra, S.4
-
39
-
-
53149126145
-
Tinypbc: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
-
Kanazawa, Japan, June 17-19 IEEE Computer Society, Washington, DC, USA
-
Oliveira, L., Scott, M., Lopez, J. and Dahab, R. (2008) TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks. Proc. INSS?08, Kanazawa, Japan, June 17-19, pp. 173-180. IEEE Computer Society, Washington, DC, USA
-
(2008)
Proc. INSS?08
, pp. 173-180
-
-
Oliveira, L.1
Scott, M.2
Lopez, J.3
Dahab, R.4
-
41
-
-
70349154616
-
On the application of pairing based cryptography to wireless sensor networks
-
Zurich, Switzerland ACM, NewYork, NY, USA
-
Szczechowiak, P., Kargl, A., Scott, M. and Collier, M. (2009) On the Application of Pairing Based Cryptography to Wireless Sensor Networks. Proc.WiSec?09, Zurich, Switzerland, pp. 1-12. ACM, NewYork, NY, USA
-
(2009)
Proc.WiSec?09
, pp. 1-12
-
-
Szczechowiak, P.1
Kargl, A.2
Scott, M.3
Collier, M.4
-
42
-
-
79955044491
-
Implementation of data survival in unattended wireless sensor network using cryptography
-
Sheraton Denver, Downtown Denver, CO, USA, October 10-14 IEEE Computer Society,Washington DC, USA
-
Mateus, A.S.S., Margi, C.B., Simplicio, M.A., Geovandro, C.C.F.P. and de Oliveira, B.T. (2010) Implementation of Data Survival in Unattended Wireless Sensor Network Using Cryptography. Proc. LCN?10, Sheraton Denver, Downtown Denver, CO, USA, October 10-14, pp. 961-967. IEEE Computer Society,Washington, DC, USA
-
(2010)
Proc. LCN?10
, pp. 961-967
-
-
Mateus, A.S.S.1
Margi, C.B.2
Simplicio, M.A.3
Geovandro, C.C.F.P.4
De Oliveira, B.T.5
-
43
-
-
25644439798
-
Several security schemes constructed using ECC-based self-certified public key cryptosystems
-
Tsaur, W.J. (2005) Several security schemes constructed using ECC-based self-certified public key cryptosystems. J. Appl. Math. Comput. J., 168, 447-464
-
(2005)
J. Appl. Math. Comput. J.
, vol.168
, pp. 447-464
-
-
Tsaur, W.J.1
-
44
-
-
60349125224
-
Self-certified multi-proxy signature schemes with message recovery
-
Wu,T.S., Hsu, C.L. and Li, H.Y. (2009) Self-certified multi-proxy signature schemes with message recovery. J. Zhejiang Univ. 7 Sci. A, 10, 290-300
-
(2009)
J. Zhejiang Univ. 7 Sci. A
, vol.10
, pp. 290-300
-
-
Wu, T.S.1
Hsu, C.L.2
Li, H.Y.3
-
45
-
-
84870700738
-
A fairexchange e-payment protocol for digital products with customer unlinkability
-
Yen, Y-C., Wu, T-C., Lo, N-W. and Tsai, K-Y. (2012) A fairexchange e-payment protocol for digital products with customer unlinkability. KSII Trans. Internet Inf. Syst., 6, 2956-2979
-
(2012)
KSII Trans. Internet Inf. Syst
, vol.6
, pp. 2956-2979
-
-
Yen, Y.-C.1
Wu, T.-C.2
Lo, N.-W.3
Tsai, K.-Y.4
-
46
-
-
0345058965
-
Factoring estimates for a 1024- bitrsamodulus
-
Taipei,Taiwan,November 30-December 4 Lecture Notes in Computer Science 2894 Springer, NewYork, USA
-
Lenstra, A., Tromer, E., Shamir, A., Kortsmit, W., Dodson, B., Hughes, J. and Leyland, P. (2003) Factoring Estimates for a 1024- bitRSAModulus. Proc. AsiaCrypt?03,Taipei,Taiwan,November 30-December 4, pp. 55-74 Lecture Notes in Computer Science 2894, Springer, NewYork, USA
-
(2003)
Proc. AsiaCrypt?03
, pp. 55-74
-
-
Lenstra, A.1
Tromer, E.2
Shamir, A.3
Kortsmit, W.4
Dodson, B.5
Hughes, J.6
Leyland, P.7
|