-
1
-
-
18244373181
-
AT wireless body area network of intelligent motion sensors for computei assisted physical rehabilitation
-
E.Jovanov, A Milenkovic C. Otto, and P. C.D. Groen, "AT wireless body area network of intelligent motion sensors for computei assisted physical rehabilitation"Journal of NeuroEngineering and Rehabilitation, vol. 2, no. 6, 2005.
-
(2005)
Journal of NeuroEngineering and Rehabilitation
, vol.2
, Issue.6
-
-
Jovanov, E.1
Milenkovic C Otto, A.2
Groen, P.C.D.3
-
2
-
-
35549002780
-
Addressing security in medical sensor networks
-
San Juan, Puerto Rico, USA
-
K. Malasri and L. Wang, "Addressing Security in Medical SensorfNetworks,"HealthNet'07, pp. 7-12, San Juan, Puerto Rico, USA, 2007.
-
(2007)
Health Net'07
, pp. 7-12
-
-
Malasri, K.1
Wang, L.2
-
3
-
-
80053520387
-
Trus key management scheme for wireless body area networks
-
M. Mana, M. Feham, and B. A. BensaberJ "Trus Key Management Scheme for Wireless Body Area Networks, "International Journal of Network Security, Vol. 12, No. 2, PP. 75,2011.
-
(2011)
International Journal of Network Security
, vol.12
, Issue.2
, pp. 75
-
-
Mana, M.1
Feham, M.2
Bensaber, B.A.3
-
4
-
-
77649151691
-
Monitoring Patients via a Secure and Mobile Healthcare System
-
Y. Ren, R.W.N. Pazzi, A. Boukerche "Monitoring Patients via a Secure and Mobile Healthcare System," Wireless Communications, IEEE, Vol 17, pp. 59-65, 2010.
-
(2010)
Wireless Communications, IEEE
, vol.17
, pp. 59-65
-
-
Ren, Y.1
Pazzi, R.W.N.2
Boukerche, A.3
-
5
-
-
84991695860
-
Network security essentials: Applications and standards
-
W. Stalling "Network Security Essentials: Applications and Standards,'? Fourth edition Pearson ISBN 13 978-0-13610805-4, 2011.
-
(2011)
Fourth Edition Pearson
-
-
Stalling, W.1
-
7
-
-
37149040069
-
Enabling full-size public- key algorithms on 8-bitfsensor nodes
-
Springer-Verlag
-
L. Uhsadel A Poschmann and C. Paar "Enabling full-size public- key algorithms on 8-bitfsensor nodes,"Proceedings of European Workshop on Security in Ad-Hoc and Sensor Networks, LNCS 4572, pp. 73-86, Springer-Verlag, 2007.
-
(2007)
Proceedings of European Workshop on Security in Ad-Hoc and Sensor Networks, LNCS
, vol.4572
, pp. 73-86
-
-
Uhsadel, A.1
Poschmann, L.2
Paar, C.3
-
11
-
-
84991695880
-
-
IEEE P1363, D13, Standard Specifications for Public-Key Cryptography
-
IEEE P1363, D13, Standard Specifications for Public-Key Cryptography, 1999. http://grouper.ieee.org/groups/1363/
-
(1999)
-
-
-
12
-
-
0003875045
-
-
Department of Computer Science and Illinois Genetic Algorithms Laboratory University of Illinois at Urbana-Champaign
-
E. Cantii-Paz, "[ A Survey of Parallel Genetic Algorithms," Department of Computer Science and Illinois Genetic Algorithms Laboratory University of Illinois at Urbana-Champaign, 1997.
-
(1997)
A Survey of Parallel Genetic Algorithms
-
-
Cantii-Paz, E.1
-
13
-
-
2642575930
-
Parallel heterogeneous genetic algorithms for continuous optimization
-
ELSEVIER
-
E. Alba F. Luna A J Nebro and J M. Troya "Parallel Heterogeneous Genetic Algorithms for Continuous Optimization," Parallel Computing Vol? 30 pp. 699-719. ELSEVIER, 2004.
-
(2004)
Parallel Computing
, vol.30
, pp. 699-719
-
-
Alba, F.1
Luna, A.J.2
Nebro, E.3
Troya, J.M.4
-
14
-
-
44249096381
-
Securin U-healthcare sensor networks using public key based scheme
-
Feb. 17-20
-
Md. M.Haque A SK Pathan an C S Hong "Securin U-healthcare sensor networks using public key based scheme," ICACT '08, pp. 1108-1111, Feb. 17-20, 2008.
-
(2008)
ICACT '08
, pp. 1108-1111
-
-
Haque, M.M.1
Pathan, A.S.K.2
Hong, C.S.3
-
16
-
-
70350523878
-
Selection of security elliptic curve based or evolutior algorithm
-
M. Wang G Dai H. Hu L Pen "Selection of Security Elliptic Curve Based or Evolutior Algorithm," International Conference on Computational Intelligence and Natural Computing, IEEE, pp. 55-57, 2009.
-
(2009)
International Conference on Computational Intelligence and Natural Computing, IEEE
, pp. 55-57
-
-
Wang, M.1
Dai, G.2
Hu, H.3
Pen, L.4
-
17
-
-
84966233278
-
Elliptic curved over finite fields and the computation of square roots
-
R. Schoof "Elliptic Curved Over Finite Fields and the Computation of Square RootS mo| p,T Mathematics of Computation, Vol 44, 483-494, 1985.
-
(1985)
Mathematics of Computation
, vol.44
, pp. 483-494
-
-
Schoof, R.1
-
18
-
-
84919085619
-
An improved algorithm for computing logarithm over gf (p) and its cryptographic ignificance
-
Pohlig S. C. andfHellman M. E, "An improved algorithm for computing logarithm over GF (p) and its cryptographic ignificanceTIEEEfTrans. InffTheory, pp. 106-110, 1978.
-
(1978)
IEEE Trans. Inf Theory
, pp. 106-110
-
-
Pohlig, M.E.1
Hellman, C.S.2
-
20
-
-
84958550160
-
The wei and tate pairing as building blocks for publickey cryptosystems
-
Springer
-
A JOUXJ "The Wei and Tate Pairing aS Building Blocks foi PublicKe yfCryptosystems,"AlgorithmicNu mberfTheory Vol. 2369, Springer, pp. 20-32, 2002.
-
(2002)
Algorithmic Number Theory
, vol.2369
, pp. 20-32
-
-
Jouxj, A.1
-
23
-
-
35248866341
-
Or the efficien generation of elliptic curves over prime fields
-
Springer-Verlag, LNCS
-
E. Konstantinou, Y. Stamatiou, and C. Zaroliagis "Or the Efficien Generation of Elliptic Curves over Prime Fields," in Cryptographic Hardware and Embedded Systems- CHES 2002, Springer-Verlag, LNCS 2523, pp. 333-348, 2002.
-
(2002)
Cryptographic Hardware and Embedded Systems- CHES 2002
, vol.2523
, pp. 333-348
-
-
Konstantinou, E.1
Stamatiou, Y.2
Zaroliagis, C.3
-
24
-
-
24944453778
-
Generating elliptic curved of prime order
-
Springer-Verlag, LNCS
-
E. Savas, T. A; Schmidf and C. K KOC "Generating Elliptic Curved of Prime Order," in Cryptographic Hardware and Embedded Systems -CHES 2001, Springer-Verlag, LNCS 2162, pp. 145-161,2001.
-
(2001)
Cryptographic Hardware and Embedded Systems -CHES 2001
, vol.2162
, pp. 145-161
-
-
Savas, E.1
Schmidf, T.A.2
Koc, C.K.3
-
26
-
-
84888631453
-
Review on paralle evolutionary computing and introduce three general framework to parallelize al ec algorithms
-
A; Majd, Sh. Lotfi and G. Sahebi "Review on Paralle Evolutionary Computing and Introduce Three General Framework to Parallelize Al EC Algorithms," The 5th Conference on Information and Knowledge Technology, IEEE, pp. 61-66, 2013.
-
(2013)
The 5th Conference on Information and Knowledge Technology, IEEE
, pp. 61-66
-
-
Majd, A.1
Lotfi, Sh.2
Sahebi, G.3
-
30
-
-
84968701424
-
A survey on paralle evolutionary computing and introduce four general frameworks to parallelize all ec algorithms and create new operation for migration
-
A Majd and G. Sahebi "A Survey on Paralle Evolutionary Computing and Introduce Four General Frameworks to Parallelize All EC Algorithms and Create New Operation for Migration," Journal of Information and computing Science Vol. 9, pp. 97-105, 2014.
-
(2014)
Journal of Information and Computing Science
, vol.9
, pp. 97-105
-
-
Majd, A.1
Sahebi, G.2
-
33
-
-
84991664607
-
A paralle micro evolutionary algorithm for heterogeneous computing and grid scheduling
-
Elsevier
-
S. Nesmachnow, H. Cancela, and E. Alba "A paralle micro evolutionary algorithm for heterogeneous computing and grid scheduling," Applied Sofi Computing 12 Elsevier pp. 626639, 2012.
-
(2012)
Applied Sof Computing
, vol.12
, pp. 626639
-
-
Nesmachnow, S.1
Cancela, H.2
Alba, E.3
|