-
1
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
Li, M.; Lou, W.; Ren, K. Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 2010, 17, 51-58.
-
(2010)
IEEE Wirel. Commun.
, vol.17
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
2
-
-
77953151195
-
Prognosis-A Wearable Health-Monitoring System for People at Risk: Methodology and Modeling
-
Pantelopoulos, A.; Bourbakis, N. Prognosis-A Wearable Health-Monitoring System for People at Risk: Methodology and Modeling. IEEE Trans. Inf. Technol. Biomed. 2010, 14, 613-621.
-
(2010)
IEEE Trans. Inf. Technol. Biomed.
, vol.14
, pp. 613-621
-
-
Pantelopoulos, A.1
Bourbakis, N.2
-
3
-
-
84914677261
-
-
Technical Report; Transparency Market Research: Albany, NY, USA
-
Transparency Market Research. Implantable Medical Devices Market (Reconstructive Joint Replacement, Spinal Implants, Cardiovascular Implants, Dental Implants, Intraocular Lens and Breast Implants)-U.S. Industry Analysis, Size, Share, Trends, Growth And Forecast 2012-2018; Technical Report; Transparency Market Research: Albany, NY, USA, 2013.
-
(2013)
Implantable Medical Devices Market (Reconstructive Joint Replacement, Spinal Implants, Cardiovascular Implants, Dental Implants, Intraocular Lens and Breast Implants)-U.S. Industry Analysis, Size, Share, Trends, Growth And Forecast 2012-2018
-
-
Transparency Market Research1
-
4
-
-
40649108378
-
Emerging Technologies [wireless communication systems for implantable medical devices]
-
Panescu, D. Emerging Technologies [wireless communication systems for implantable medical devices]. IEEE Eng. Med. Biol. Mag. 2008, 27, 96-101.
-
(2008)
IEEE Eng. Med. Biol. Mag.
, vol.27
, pp. 96-101
-
-
Panescu, D.1
-
6
-
-
84878319615
-
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
-
Lin, H.; Shao, J.; Zhang, C.; Fang, Y. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. IEEE Trans. Inf. Forensics Secur. 2013, 8, 985-997.
-
(2013)
IEEE Trans. Inf. Forensics Secur.
, vol.8
, pp. 985-997
-
-
Lin, H.1
Shao, J.2
Zhang, C.3
Fang, Y.4
-
7
-
-
79959821040
-
Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring
-
Darwish, A.; Hassanien, A.E. Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring. Sensors 2011, 11, 5561-5595.
-
(2011)
Sensors
, vol.11
, pp. 5561-5595
-
-
Darwish, A.1
Hassanien, A.E.2
-
8
-
-
84860253312
-
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
-
Ameen, M.; Liu, J.; Kwak, K. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications. J. Med. Syst. 2012, 36, 93-101.
-
(2012)
J. Med. Syst.
, vol.36
, pp. 93-101
-
-
Ameen, M.1
Liu, J.2
Kwak, K.3
-
9
-
-
85132893778
-
Security and Privacy in Wireless Body Area Networks for Health Care Applications
-
Khan, S., Khan Pathan, A.S., Eds.; Springer: Berlin/Heidelberg, Germany
-
Javadi, S.; Razzaque, M. Security and Privacy in Wireless Body Area Networks for Health Care Applications. In Wireless Networks and Security; Khan, S., Khan Pathan, A.S., Eds.; Springer: Berlin/Heidelberg, Germany, 2013; pp. 165-187.
-
(2013)
Wireless Networks and Security
, pp. 165-187
-
-
Javadi, S.1
Razzaque, M.2
-
10
-
-
50249098733
-
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
-
Oakland, CA, USA, 18-22 May
-
Halperin, D.; Heydt-Benjamin, T.; Ransford, B.; Clark, S.; Defend, B.; Morgan,W.; Fu, K.; Kohno, T.; Maisel, W. Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, 18-22 May 2008; pp. 129-142.
-
(2008)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.2
Ransford, B.3
Clark, S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.9
-
11
-
-
84870885441
-
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
-
Li, M.; Yu, S.; Zheng, Y.; Ren, K.; Lou, W. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 131-143.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
12
-
-
84863537000
-
Design Challenges for Secure Implantable Medical Devices
-
San Francisco, CA, USA, 3-7 June
-
Burleson, W.; Clark, S.S.; Ransford, B.; Fu, K. Design Challenges for Secure Implantable Medical Devices. In Proceedings of the 49th Annual Design Automation Conference, San Francisco, CA, USA, 3-7 June 2012; pp. 12-17.
-
(2012)
Proceedings of the 49th Annual Design Automation Conference
, pp. 12-17
-
-
Burleson, W.1
Clark, S.S.2
Ransford, B.3
Fu, K.4
-
13
-
-
84978647020
-
Level based Fault Monitoring and Security for Long Range Transmission in WBAN
-
Raja, S.K.S.; Jebarajan, T. Level based Fault Monitoring and Security for Long Range Transmission in WBAN. Int. J. Comput. Appl. 2013, 64, 1-9.
-
(2013)
Int. J. Comput. Appl.
, vol.64
, pp. 1-9
-
-
Raja, S.K.S.1
Jebarajan, T.2
-
14
-
-
79952071204
-
FDAC: Toward Fine-Grained Distributed Data Access Control inWireless Sensor Networks
-
Yu, S.; Ren, K.; Lou,W. FDAC: Toward Fine-Grained Distributed Data Access Control inWireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 2011, 22, 673-686.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, pp. 673-686
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
15
-
-
84866889971
-
PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks
-
Macau, China, 18-21 June
-
Guo, L.; Zhang, C.; Sun, J.; Fang, Y. PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks. In Proceedings of 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), Macau, China, 18-21 June 2012, pp. 224-233.
-
(2012)
Proceedings of 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS)
, pp. 224-233
-
-
Guo, L.1
Zhang, C.2
Sun, J.3
Fang, Y.4
-
16
-
-
84898823624
-
CP-ABE With Constant-Size Keys for Lightweight Devices
-
Guo, F.; Mu, Y.; Susilo, W.; Wong, D.; Varadharajan, V. CP-ABE With Constant-Size Keys for Lightweight Devices. IEEE Trans. Inf. Forensics Secur. 2014, 9, 763-771.
-
(2014)
IEEE Trans. Inf. Forensics Secur.
, vol.9
, pp. 763-771
-
-
Guo, F.1
Mu, Y.2
Susilo, W.3
Wong, D.4
Varadharajan, V.5
-
17
-
-
0027699087
-
Lattice-Based Access Control Models
-
Sandhu, R.S. Lattice-Based Access Control Models. IEEE Comput. 1993, 26, 9-19.
-
(1993)
IEEE Comput.
, vol.26
, pp. 9-19
-
-
Sandhu, R.S.1
-
18
-
-
24944554962
-
Fuzzy Identity-Based Encryption
-
Cramer, R., Ed.; Springer: Berlin/Heidelberg, Germany
-
Sahai, A.; Waters, B. Fuzzy Identity-Based Encryption. In Advances in Cryptology- EUROCRYPT 2005; Cramer, R., Ed.; Springer: Berlin/Heidelberg, Germany, 2005; pp. 457-473.
-
(2005)
Advances in Cryptology- EUROCRYPT 2005
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
19
-
-
34547273527
-
Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data
-
Alexandria, VA, USA, 30 October-3 November
-
Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October-3 November 2006; pp. 89-98.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
20
-
-
74049120601
-
Attribute-based Encryption with Non-Monotonic Access Structures
-
Alexandria, VA, USA, 29 October-2 November
-
Ostrovsky, R.; Sahai, A.; Waters, B. Attribute-based Encryption with Non-Monotonic Access Structures. In Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 29 October-2 November 2007; pp. 195-203.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
21
-
-
34548731375
-
Ciphertext-Policy Attribute-Based Encryption
-
Berkeley, CA, USA, 20-23 May
-
Bethencourt, J.; Sahai, A.; Waters, B. Ciphertext-Policy Attribute-Based Encryption. In Proceedings of IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 20-23 May 2007; pp. 321-334.
-
(2007)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
22
-
-
78649998200
-
Hierarchical Attribute-Based Encryption for Fine-grained Access Control in Cloud Storage Services
-
Chicago, IL, USA, 4-8 October
-
Wang, G.; Liu, Q.; Wu, J. Hierarchical Attribute-Based Encryption for Fine-grained Access Control in Cloud Storage Services. In Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 4-8 October 2010; pp. 735-737.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
23
-
-
79952521560
-
Ciphertext-policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
-
Springer-Verlag: Berlin/Heidelberg, Germany
-
Waters, B. Ciphertext-policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In Public Key Cryptography-PKC 2011; Springer-Verlag: Berlin/Heidelberg, Germany, 2011; pp. 53-70.
-
(2011)
Public Key Cryptography-PKC 2011
, pp. 53-70
-
-
Waters, B.1
-
24
-
-
85076484262
-
Outsourcing the Decryption of ABE Ciphertexts
-
San Francisco, CA, USA, 8-12 August
-
Green, M.; Hohenberger, S.; Waters, B. Outsourcing the Decryption of ABE Ciphertexts. In Proceedings of the 20th USENIX Conference on Security, San Francisco, CA, USA, 8-12 August 2011; pp. 34-34.
-
(2011)
Proceedings of the 20th USENIX Conference on Security
, pp. 34
-
-
Green, M.1
Hohenberger, S.2
Waters, B.3
-
25
-
-
51849088550
-
Dynamic Threshold Public-Key Encryption
-
Wagner, D., Ed.; Springer: Berlin/Heidelberg, Germany
-
Delerablée, C.; Pointcheval, D. Dynamic Threshold Public-Key Encryption. In Advances in Cryptology-CRYPTO 2008; Wagner, D., Ed.; Springer: Berlin/Heidelberg, Germany, 2008; Vol. 5157, pp. 317-334.
-
(2008)
Advances in Cryptology-CRYPTO 2008
, vol.5157
, pp. 317-334
-
-
Delerablée, C.1
Pointcheval, D.2
-
26
-
-
79952523217
-
Constant Size Ciphertexts in Threshold Attribute-Based Encryption
-
Nguyen, P.Q., Pointcheval, D., Eds.; Springer: Berlin/Heidelberg, Germany
-
Herranz, J.; Laguillaumie, F.; Ráfols, C. Constant Size Ciphertexts in Threshold Attribute-Based Encryption. In Public Key Cryptography-PKC 2010; Nguyen, P.Q., Pointcheval, D., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; Volume 6056, pp. 19-34.
-
(2010)
Public Key Cryptography-PKC 2010
, vol.6056
, pp. 19-34
-
-
Herranz, J.1
Laguillaumie, F.2
Ráfols, C.3
-
27
-
-
84865479255
-
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
-
Safavi-Naini, R., Canetti, R., Eds.; Springer: Berlin/Heidelberg, Germany
-
Lewko, A.; Waters, B. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques. In Advances in Cryptology-CRYPTO 2012; Safavi-Naini, R., Canetti, R., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; Volume 7417, pp. 180-198.
-
(2012)
Advances in Cryptology-CRYPTO 2012
, vol.7417
, pp. 180-198
-
-
Lewko, A.1
Waters, B.2
-
28
-
-
0345565888
-
The Many Faces of Publish/Subscribe
-
Eugster, P.T.; Felber, P.A.; Guerraoui, R.; Kermarrec, A.M. The Many Faces of Publish/Subscribe. ACM Comput. Surv. 2003, 35, 114-131.
-
(2003)
ACM Comput. Surv.
, vol.35
, pp. 114-131
-
-
Eugster, P.T.1
Felber, P.A.2
Guerraoui, R.3
Kermarrec, A.M.4
-
29
-
-
84875726669
-
On reliability in publish/subscribe services
-
Esposito, C.; Cotroneo, D.; Russo, S. On reliability in publish/subscribe services. Comput. Netw. 2013, 57, 1318-1343.
-
(2013)
Comput. Netw.
, vol.57
, pp. 1318-1343
-
-
Esposito, C.1
Cotroneo, D.2
Russo, S.3
-
30
-
-
85077120667
-
Appscope: Application energymetering framework for android smartphone using kernel activity monitoring
-
Boston, MA, USA, 12-15 June
-
Yoon, C.; Kim, D.; Jung,W.; Kang, C.; Cha, H. Appscope: Application energymetering framework for android smartphone using kernel activity monitoring. In Proceedings of 2012 USENIX Annual Technical Conference, Boston, MA, USA, 12-15 June 2012.
-
(2012)
Proceedings of 2012 USENIX Annual Technical Conference
-
-
Yoon, C.1
Kim, D.2
Jung, W.3
Kang, C.4
Cha, H.5
-
31
-
-
84869015294
-
DevScope: A nonintrusive and online power analysis tool for smartphone hardware components
-
Tampere, Finland, 7-12 October
-
Jung, W.; Kang, C.; Yoon, C.; Kim, D.; Cha, H. DevScope: A nonintrusive and online power analysis tool for smartphone hardware components. In Proceedings of the eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and Sstem Synthesis, Tampere, Finland, 7-12 October 2012; pp. 353-362.
-
(2012)
Proceedings of the eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and Sstem Synthesis
, pp. 353-362
-
-
Jung, W.1
Kang, C.2
Yoon, C.3
Kim, D.4
Cha, H.5
-
32
-
-
79960873920
-
IMDGuard: Securing implantable medical devices with the external wearable guardian
-
Shanghai, China, 10-15 April
-
Xu, F.; Qin, Z.; Tan, C.; Wang, B.; Li, Q. IMDGuard: Securing implantable medical devices with the external wearable guardian. In Proceedings of 2011 IEEE INFOCOM, Shanghai, China, 10-15 April 2011; pp. 1862-1870.
-
(2011)
Proceedings of 2011 IEEE INFOCOM
, pp. 1862-1870
-
-
Xu, F.1
Qin, Z.2
Tan, C.3
Wang, B.4
Li, Q.5
-
33
-
-
80053135174
-
They Can Hear Your Heartbeats: Non-invasive Security for Implantable Medical Devices
-
Gollakota, S.; Hassanieh, H.; Ransford, B.; Katabi, D.; Fu, K. They Can Hear Your Heartbeats: Non-invasive Security for Implantable Medical Devices. SIGCOMM Comput. Commun. Rev. 2011, 41, 2-13.
-
(2011)
SIGCOMM Comput. Commun. Rev.
, vol.41
, pp. 2-13
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
34
-
-
80755181009
-
Securing Electronic Medical Records Using Attribute-based Encryption on Mobile Devices
-
Chicago, IL, USA, 17-21 October
-
Akinyele, J.A.; Pagano, M.W.; Green, M.D.; Lehmann, C.U.; Peterson, Z.N.; Rubin, A.D. Securing Electronic Medical Records Using Attribute-based Encryption on Mobile Devices. In Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Chicago, IL, USA, 17-21 October 2011; pp. 75-86.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 75-86
-
-
Akinyele, J.A.1
Pagano, M.W.2
Green, M.D.3
Lehmann, C.U.4
Peterson, Z.N.5
Rubin, A.D.6
-
35
-
-
79960586120
-
PEACE: An efficient and secure patient-centric access control scheme for eHealth care system
-
Shanghai, China, 10-15 April
-
Barua, M.; Liang, X.; Lu, R.; Shen, X. PEACE: An efficient and secure patient-centric access control scheme for eHealth care system. In Proceedings of 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Shanghai, China, 10-15 April 2011; pp. 970-975.
-
(2011)
Proceedings of 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
, pp. 970-975
-
-
Barua, M.1
Liang, X.2
Lu, R.3
Shen, X.4
-
36
-
-
84867800053
-
Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks
-
Munich, Germany, 30 July-2 August
-
Lounis, A.; Hadjidj, A.; Bouabdallah, A.; Challal, Y. Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks. In Proceedings of 2012 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany, 30 July-2 August 2012; pp. 1-7.
-
(2012)
Proceedings of 2012 21st International Conference on Computer Communications and Networks (ICCCN)
, pp. 1-7
-
-
Lounis, A.1
Hadjidj, A.2
Bouabdallah, A.3
Challal, Y.4
-
37
-
-
84879836190
-
CRYPE: Towards Cryptographically Enforced and Privacy Enhanced WBANs
-
Kollam, India, 17-19 August
-
Ragesh, G.K.; Baskaran, K. CRYPE: Towards Cryptographically Enforced and Privacy Enhanced WBANs. In Proceedings of the First International Conference on Security of Internet of Things, Kollam, India, 17-19 August 2012; pp. 204-209.
-
(2012)
Proceedings of the First International Conference on Security of Internet of Things
, pp. 204-209
-
-
Ragesh, G.K.1
Baskaran, K.2
-
38
-
-
84893452444
-
Privacy-Preserving Wireless Medical Sensor Network
-
Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Austrlia, 16-18 July
-
Yi, X.; Willemson, J.; Nait-Abdesselam, F. Privacy-Preserving Wireless Medical Sensor Network. In Proceedings of 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, VIC, Austrlia, 16-18 July 2013; pp. 118-125.
-
(2013)
Proceedings of 2013 12th IEEE International Conference on Trust
, pp. 118-125
-
-
Yi, X.1
Willemson, J.2
Nait-Abdesselam, F.3
-
39
-
-
84901352780
-
Surveying Wearable Human Assistive Technology for Life and Safety Critical Applications: Standards, Challenges and Opportunities
-
Alam, M.M.; Hamida, E.B. Surveying Wearable Human Assistive Technology for Life and Safety Critical Applications: Standards, Challenges and Opportunities. Sensors 2014, 14, 9153-9209.
-
(2014)
Sensors
, vol.14
, pp. 9153-9209
-
-
Alam, M.M.1
Hamida, E.B.2
-
40
-
-
84914688458
-
Security and Privacy in Biomedical Telemetry: Mobile Health Platform for Secure Information Exchange
-
Wiley-IEEE: Hoboken, NJ, USA
-
Bourbakis, N.; Pantelopoulos, A.; Kannavara, R.; Nikita, K. Security and Privacy in Biomedical Telemetry: Mobile Health Platform for Secure Information Exchange. In Handbook of Biomedical Telemetry; Wiley-IEEE: Hoboken, NJ, USA, 2014; pp. 382-418.
-
(2014)
Handbook of Biomedical Telemetry
, pp. 382-418
-
-
Bourbakis, N.1
Pantelopoulos, A.2
Kannavara, R.3
Nikita, K.4
-
41
-
-
84906779666
-
Real-time query processing optimization for cloud-based wireless body area networks
-
Diallo, O.; Rodrigues, J.J.; Sene, M.; Niu, J. Real-time query processing optimization for cloud-based wireless body area networks. Inf. Sci. 2014, 284, 84-94.
-
(2014)
Inf. Sci.
, vol.284
, pp. 84-94
-
-
Diallo, O.1
Rodrigues, J.J.2
Sene, M.3
Niu, J.4
-
42
-
-
84894126402
-
CoSeMed-Cooperative and secure medical device cloud
-
Applications Services Healthcom, Lisbon, Portugal, 9-12 October
-
Kliem, A.; Kao, O. CoSeMed-Cooperative and secure medical device cloud. In Proceedings of 2013 IEEE 15th International Conference on e-Health Networking, Applications Services Healthcom, Lisbon, Portugal, 9-12 October 2013; pp. 260-264.
-
(2013)
Proceedings of 2013 IEEE 15th International Conference on e-Health Networking
, pp. 260-264
-
-
Kliem, A.1
Kao, O.2
-
43
-
-
84883076035
-
DAC-MACS: Effective data access control for multi-authority cloud storage systems
-
Turin, Italy, 14-19 April
-
Yang, K.; Jia, X.; Ren, K.; Zhang, B. DAC-MACS: Effective data access control for multi-authority cloud storage systems. In Proceedings of 2013 Proceedings IEEE INFOCOM, Turin, Italy, 14-19 April 2013; pp. 2895-2903.
-
(2013)
Proceedings of 2013 Proceedings IEEE INFOCOM
, pp. 2895-2903
-
-
Yang, K.1
Jia, X.2
Ren, K.3
Zhang, B.4
-
44
-
-
84879512416
-
Securing Communications Between External Users and Wireless Body Area Networks
-
Budapest, Hungary, 19 April
-
Hu, C.; Zhang, F.; Cheng, X.; Liao, X.; Chen, D. Securing Communications Between External Users and Wireless Body Area Networks. In Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy Co-Located with ACM WiSec 2013, Budapest, Hungary, 19 April 2013; pp. 31-36.
-
(2013)
Proceedings of the 2nd ACM Workshop on Hot Topics on Wireless Network Security and Privacy Co-Located with ACM WiSec 2013
, pp. 31-36
-
-
Hu, C.1
Zhang, F.2
Cheng, X.3
Liao, X.4
Chen, D.5
-
45
-
-
84892462883
-
A System Architecture, Processor, and Communication Protocol for Secure Implants
-
Strydis, C.; Seepers, R.M.; Peris-Lopez, P.; Siskos, D.; Sourdis, I. A System Architecture, Processor, and Communication Protocol for Secure Implants. ACM Trans. Archit. Code Optim. 2013, 10, 57:1-57:23.
-
(2013)
ACM Trans. Archit. Code Optim.
, vol.10
, pp. 57:1-57:23
-
-
Strydis, C.1
Seepers, R.M.2
Peris-Lopez, P.3
Siskos, D.4
Sourdis, I.5
|