-
1
-
-
84900303431
-
-
United Nations, New York, NY, USA
-
World Population Ageing 2013, United Nations, New York, NY, USA, 2013, pp. 8-10.
-
(2013)
World Population Ageing 2013
, pp. 8-10
-
-
-
2
-
-
24644498485
-
RFID: A technical overview and its application to the enterprise
-
May/Jun.
-
R. Weinstein, "RFID: A technical overview and its application to the enterprise," IT Prof., vol. 7, no. 3, pp. 27-33, May/Jun. 2005.
-
(2005)
IT Prof.
, vol.7
, Issue.3
, pp. 27-33
-
-
Weinstein, R.1
-
3
-
-
84938412832
-
Untraceable sensor movement in distributed IoT infrastructure
-
Sep.
-
P. Gope and T. Hwang, "Untraceable sensor movement in distributed IoT infrastructure," IEEE Sensors J., vol. 15, no. 9, pp. 5340-5348, Sep. 2015.
-
(2015)
IEEE Sensors J.
, vol.15
, Issue.9
, pp. 5340-5348
-
-
Gope, P.1
Hwang, T.2
-
4
-
-
84947040044
-
A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system
-
Nov.
-
P. Gope and T. Hwang, "A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system," Comput. Secur., vol. 55, pp. 271-280, Nov. 2015.
-
(2015)
Comput. Secur.
, vol.55
, pp. 271-280
-
-
Gope, P.1
Hwang, T.2
-
5
-
-
84863011893
-
Security issues in healthcare applications using wireless medical sensor networks: A survey
-
P. Kumar and H.-J. Lee, "Security issues in healthcare applications using wireless medical sensor networks: A survey," Sensors, vol. 12, no. 1, pp. 55-91, 2012.
-
(2012)
Sensors
, vol.12
, Issue.1
, pp. 55-91
-
-
Kumar, P.1
Lee, H.-J.2
-
6
-
-
33846922052
-
CodeBlue: An ad hoc sensor network infrastructure for emergency medical care
-
Boston, MA, USA Jun.
-
D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton, "CodeBlue: An ad hoc sensor network infrastructure for emergency medical care," in Proc. MobiSys Workshop Appl. Mobile Embedded Syst. (WAMES), Boston, MA, USA, Jun. 2004, pp. 1-8.
-
(2004)
Proc. MobiSys Workshop Appl. Mobile Embedded Syst. (WAMES)
, pp. 1-8
-
-
Malan, D.1
Fulford-Jones, T.2
Welsh, M.3
Moulton, S.4
-
7
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
Oct./Dec.
-
K. Lorincz et al., "Sensor networks for emergency response: Challenges and opportunities," IEEE Pervasive Comput., vol. 3, no. 4, pp. 16-23, Oct./Dec. 2004.
-
(2004)
IEEE Pervasive Comput.
, vol.3
, Issue.4
, pp. 16-23
-
-
Lorincz, K.1
-
8
-
-
45849120977
-
-
Dept. Comput. Sci., Univ. Virginia, Charlottesville, VA, USA, Tech. Rep. CS-2006-01
-
A. Wood et al., "ALARM-NET: Wireless sensor networks for assistedliving and residential monitoring," Dept. Comput. Sci., Univ. Virginia, Charlottesville, VA, USA, Tech. Rep. CS-2006-01, 2006.
-
(2006)
ALARM-NET: Wireless Sensor Networks for Assistedliving and Residential Monitoring
-
-
Wood, A.1
-
9
-
-
49249085644
-
Confidentiality in sensor networks: Transactional information
-
Jul./Aug.
-
S. Pai et al., "Confidentiality in sensor networks: Transactional information," IEEE Security Privacy Mag., vol. 6, no. 4, pp. 28-35, Jul./Aug. 2008.
-
(2008)
IEEE Security Privacy Mag.
, vol.6
, Issue.4
, pp. 28-35
-
-
Pai, S.1
-
10
-
-
77952129575
-
Ubiquitous monitoring environment for wearable and implantable sensors (UbiMon)
-
Nottingham, U.K Sep.
-
J. W. P. Ng et al., "Ubiquitous monitoring environment for wearable and implantable sensors (UbiMon)," in Proc. 6th Int. Conf. Ubiquitous Comput. (UbiComp), Nottingham, U.K., Sep. 2004, pp. 1-2.
-
(2004)
Proc. 6th Int. Conf. Ubiquitous Comput. (UbiComp)
, pp. 1-2
-
-
Ng, J.W.P.1
-
11
-
-
84962442644
-
-
Office for Civil Rights. United State Department of Health and Human Services Medical Privacy [Online]. Available accessed Jun. 15, 2011
-
Office for Civil Rights. United State Department of Health and Human Services Medical Privacy. National Standards of Protect the Privacy of Personal-Health-Information. [Online]. Available: http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule/index. html, accessed Jun. 15, 2011.
-
National Standards of Protect the Privacy of Personal-Health-Information
-
-
-
12
-
-
33749537534
-
A programmable service architecture for mobile medical care
-
Pisa, Italy, Mar.
-
R. Chakravorty, "A programmable service architecture for mobile medical care," in Proc. 4th Annu. IEEE Int. Conf. Pervasive Comput. Commun. Workshop (PERSOMW), Pisa, Italy, Mar. 2006, pp. 531-536.
-
(2006)
Proc. 4th Annu. IEEE Int. Conf. Pervasive Comput. Commun. Workshop (PERSOMW)
, pp. 531-536
-
-
Chakravorty, R.1
-
13
-
-
77956373900
-
MEDiSN: Medical emergency detection in sensor networks
-
Aug.
-
J. Ko et al., "MEDiSN: Medical emergency detection in sensor networks," ACM Trans. Embed. Comput. Syst., vol. 10, no. 1, pp. 1-29, Aug. 2010.
-
(2010)
ACM Trans. Embed. Comput. Syst.
, vol.10
, Issue.1
, pp. 1-29
-
-
Ko, J.1
-
14
-
-
26444532494
-
OCB: A block-cipher mode of operation for efficient authenticated encryption
-
Aug.
-
P. Rogaway, M. Bellare, and J. Black, "OCB: A block-cipher mode of operation for efficient authenticated encryption," ACM Trans. Inf. Syst. Secur., vol. 6, no. 3, pp. 365-403, Aug. 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.3
, pp. 365-403
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
-
15
-
-
84903610110
-
Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets
-
Jul.
-
T. Hwang and P. Gope, "Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets," Wireless Pers. Commun., vol. 77, no. 1, pp. 197-224, Jul. 2014.
-
(2014)
Wireless Pers. Commun.
, vol.77
, Issue.1
, pp. 197-224
-
-
Hwang, T.1
Gope, P.2
-
16
-
-
84929958837
-
Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks
-
Jun.
-
P. Gope and T. Hwang, "Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks," Wireless Pers. Commun., vol. 82, no. 4, pp. 2231-2245, Jun. 2015.
-
(2015)
Wireless Pers. Commun.
, vol.82
, Issue.4
, pp. 2231-2245
-
-
Gope, P.1
Hwang, T.2
-
17
-
-
84962362708
-
-
Oracle Technology Network. Java Cryptography Architecture (JCA). [Online]. Available accessed Apr. 25, 2015
-
Oracle Technology Network. Java Cryptography Architecture (JCA). [Online]. Available: http://docs.oracle.com/javase/6/docs/technotes/guides/crypto/CrypoSpec.html, accessed Apr. 25, 2015.
-
-
-
-
18
-
-
70349332824
-
Caveat eptor: A comparative study of secure device pairing methods
-
Mar.
-
A. Kumar, N. Saxena, G. Tsudik, and E. Uzun, "Caveat eptor: A comparative study of secure device pairing methods," in Proc. IEEE Int. Conf. Pervasive Comput. Commun. (PerCom), Mar. 2009, pp. 1-10.
-
(2009)
Proc IEEE Int. Conf. Pervasive Comput. Commun. (PerCom)
, pp. 1-10
-
-
Kumar, A.1
Saxena, N.2
Tsudik, G.3
Uzun, E.4
-
19
-
-
85027455461
-
Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks
-
P. Gope and T. Hwang, "Lightweight and energy-efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks," IEEE Syst. J., doi: 10.1109/JSYST.2015.2416396, 2015.
-
(2015)
IEEE Syst. J
-
-
Gope, P.1
Hwang, T.2
-
20
-
-
84959297055
-
IAR-CTR and IAR-CFB: Integrity aware real-time based counter and cipher feedback modes
-
New York, NY, USA: Wiley
-
T. Hwang and P. Gope, "IAR-CTR and IAR-CFB: Integrity aware real-time based counter and cipher feedback modes," in Security and Communication Networks. New York, NY, USA: Wiley, 2015.
-
(2015)
Security and Communication Networks
-
-
Hwang, T.1
Gope, P.2
|