-
1
-
-
84863011893
-
Security issues in healthcare applications using wireless medical sensor networks: a survey
-
Kumar, P., and Lee, H. J., Security issues in healthcare applications using wireless medical sensor networks: a survey. Sensors 11(12):55–91, 2012.
-
(2012)
Sensors
, vol.11
, Issue.12
, pp. 55-91
-
-
Kumar, P.1
Lee, H.J.2
-
2
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
Li, M., Lou, W., and Ren, K., Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1):51–58, 2010.
-
(2010)
IEEE Wirel. Commun.
, vol.17
, Issue.1
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
3
-
-
84887201163
-
Free web-based personal health records: analysis of functionality
-
PID: 24221916
-
Fernández-Alemán, J. L., Seva-Llor, C. L., Toval, A., Ouhbi, S., and Fernández-Luque, L., Free web-based personal health records: analysis of functionality. J. Med. Syst. 37(6):9990, 2013. doi:10.1007/s10916-013-9990-z.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.6
, pp. 9990
-
-
Fernández-Alemán, J.L.1
Seva-Llor, C.L.2
Toval, A.3
Ouhbi, S.4
Fernández-Luque, L.5
-
4
-
-
76649094265
-
Opportunities in opportunistic computing
-
Contis, M., and Kumar, M., Opportunities in opportunistic computing. IEEE Compute. 43(1):42–50, 2011.
-
(2011)
IEEE Compute.
, vol.43
, Issue.1
, pp. 42-50
-
-
Contis, M.1
Kumar, M.2
-
5
-
-
77953050528
-
Physiological signal monitoring in the waiting areas of an emergency room
-
Curtis, D., Shih, E., and Waterman, J., Physiological signal monitoring in the waiting areas of an emergency room. In: Proceedings of body networks workshop. 2:5–8, 2008.
-
(2008)
Proceedings of body networks workshop. 2:5–8
-
-
Curtis, D.1
Shih, E.2
Waterman, J.3
-
6
-
-
84883449411
-
-
Hsu, C. L., Lee, M. R., and Su, C. H., The role of privacy protection in healthcare information systems adoption. J. Med. Syst. 31(2) 2013
-
Hsu, C. L., Lee, M. R., and Su, C. H., The role of privacy protection in healthcare information systems adoption. J. Med. Syst. 31(2). doi:10.1007/s10916-013-9966-z, 2013.
-
-
-
-
7
-
-
14544298547
-
A case study in access control requirements for a health information system
-
Evered, M., and Bogeholz, S., A case study in access control requirements for a health information system. In: The Second workshop on Australasian information security, data mining and web intelligence, and software internationalization, 2004.
-
(2004)
The Second workshop on Australasian information security, data mining and web intelligence, and software internationalization
-
-
Evered, M.1
Bogeholz, S.2
-
8
-
-
34047155030
-
Security and privacy issues with health care information technology
-
Meingast, M., Roosta, T., and Sastry, S., Security and privacy issues with health care information technology. In: Proceedings of the 28th IEEE EMBS annual international conference, 2006.
-
(2006)
Proceedings of the 28th IEEE EMBS annual international conference
-
-
Meingast, M.1
Roosta, T.2
Sastry, S.3
-
9
-
-
70449562519
-
IBE-Lite:a lightweight identity-based cryptography for body sensor networks
-
Tan, C. C., Wang, H. D., and Zhong, S., IBE-Lite:a lightweight identity-based cryptography for body sensor networks. IEEE Trans. Inf. Technol. Bio-Med. 13(6):926–932, 2009.
-
(2009)
IEEE Trans. Inf. Technol. Bio-Med.
, vol.13
, Issue.6
, pp. 926-932
-
-
Tan, C.C.1
Wang, H.D.2
Zhong, S.3
-
11
-
-
84873848479
-
SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency
-
Lu, R. X., Lin, X. D., and Shen, X. M., SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3):614–625, 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.3
, pp. 614-625
-
-
Lu, R.X.1
Lin, X.D.2
Shen, X.M.3
-
12
-
-
84871781834
-
Cluster-based certificate revocation for mobile body sensor networks
-
Wei, L., Hiroki, N., and Ansari, N., Cluster-based certificate revocation for mobile body sensor networks. IEEE Trans. Parallel Distrib. Syst. 24(2):239–249, 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.2
, pp. 239-249
-
-
Wei, L.1
Hiroki, N.2
Ansari, N.3
-
13
-
-
77951699595
-
BARI: a biometric based distributed key management approach for wireless body area networks
-
Raazi, S. M., and Kuras, U. R., BARI: a biometric based distributed key management approach for wireless body area networks. Sensors 10(8):3911–3933, 2010.
-
(2010)
Sensors
, vol.10
, Issue.8
, pp. 3911-3933
-
-
Raazi, S.M.1
Kuras, U.R.2
-
14
-
-
84890369044
-
An efficient verifiably encrypted signature from weil pairing
-
Shen, J., Zheng, W. Y., Wang, J., Zheng, Y. H., and Sun, X. M., An efficient verifiably encrypted signature from weil pairing. J. Internet Technol. 14(6):947–952, 2014.
-
(2014)
J. Internet Technol.
, vol.14
, Issue.6
, pp. 947-952
-
-
Shen, J.1
Zheng, W.Y.2
Wang, J.3
Zheng, Y.H.4
Sun, X.M.5
-
15
-
-
84886466907
-
An energy efficient stable election-based routing algorithm for wireless sensor networks
-
PID: 24284767
-
Wang, J., Zhang, Z. H., and Xia, F., An energy efficient stable election-based routing algorithm for wireless sensor networks. Sensors 13(11):14301–14320, 2013.
-
(2013)
Sensors
, vol.13
, Issue.11
, pp. 14301-14320
-
-
Wang, J.1
Zhang, Z.H.2
Xia, F.3
-
16
-
-
84876134245
-
Mobility based energy efficient and multi-sink algorithms for consumer home networks
-
Wang, J., Zhang, J. W., Lee, S. Y., and Sherratt, R. S., Mobility based energy efficient and multi-sink algorithms for consumer home networks. IEEE Trans. Consum. Electron. 59(1):77–84, 2013.
-
(2013)
IEEE Trans. Consum. Electron.
, vol.59
, Issue.1
, pp. 77-84
-
-
Wang, J.1
Zhang, J.W.2
Lee, S.Y.3
Sherratt, R.S.4
-
17
-
-
84904272742
-
-
Chen, C. L., Yang, T. T., and Shih, T. F., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 38(9).2014
-
Chen, C. L., Yang, T. T., and Shih, T. F., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 38(9). doi:10.1007/s10916-014-0112-3, 2014.
-
-
-
-
18
-
-
84944693053
-
BodyQoS: adaptive and radio-agnostic QoS for body sensor networks
-
Zhou, G., BodyQoS: adaptive and radio-agnostic QoS for body sensor networks. INFOCOM, 2009
-
(2009)
INFOCOM
-
-
Zhou, G.1
-
19
-
-
84899961852
-
Image quality assessment based on matching pursuit
-
Hong, R. C., Pan, J. X., Hao, S. J., Wang, M., Xue, F., and Xu, X. D., Image quality assessment based on matching pursuit. Inf. Sci. 273:196–211, 2014.
-
(2014)
Inf. Sci.
, vol.273
, pp. 196-211
-
-
Hong, R.C.1
Pan, J.X.2
Hao, S.J.3
Wang, M.4
Xue, F.5
Xu, X.D.6
-
20
-
-
84922280902
-
Segmentation-based image copy-move forgery detection scheme
-
Li, J., Li, X. L., Yang, B., and Sun, X. M., Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 2015. doi:10.1109/TIFS.2014.2381872.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
-
-
Li, J.1
Li, X.L.2
Yang, B.3
Sun, X.M.4
-
21
-
-
79952992733
-
Network coding based privacy preservation against traffic analysis in multi-hop wireless networks
-
Fan, Y., Network coding based privacy preservation against traffic analysis in multi-hop wireless networks. Trans. Wirel. Commun. 10(6):834–843, 2011.
-
(2011)
Trans. Wirel. Commun.
, vol.10
, Issue.6
, pp. 834-843
-
-
Fan, Y.1
-
23
-
-
84861334371
-
Trust computations and trust dynamics in wireless sensor networks: a survey
-
Govindan, K., and Mohapatra, P., Trust computations and trust dynamics in wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 14(2):279–298, 2012.
-
(2012)
IEEE Commun. Surv. Tutorials
, vol.14
, Issue.2
, pp. 279-298
-
-
Govindan, K.1
Mohapatra, P.2
-
24
-
-
85008532916
-
An interative algorithm for trust management and adversary detection for delay tolerant networks
-
Ayday, E., and Fekri, F., An interative algorithm for trust management and adversary detection for delay tolerant networks. IEEE Trans. Mob. Comput. 11(9):1514–1531, 2012.
-
(2012)
IEEE Trans. Mob. Comput.
, vol.11
, Issue.9
, pp. 1514-1531
-
-
Ayday, E.1
Fekri, F.2
|