Secure eHealth-Care Service on Self-Organizing Software Platform
暂无分享,去创建一个
[1] Alexander P. Pons,et al. Understanding user perspectives on biometric technology , 2008, CACM.
[2] Akhilesh Chandra,et al. Challenges and constraints to the diffusion of biometrics in information systems , 2005, CACM.
[3] Ankit Chaudhary,et al. A Vision-Based Method to Find Fingertips in a Closed Hand , 2012, J. Inf. Process. Syst..
[4] A. Khreishah,et al. Flow-based XOR Network Coding for Lossy Wireless Networks , 2012, IEEE Trans. Wirel. Commun..
[5] David W. Chadwick,et al. Patient Privacy in Electronic Prescription Transfer , 2003, IEEE Secur. Priv..
[6] Junho Ahn,et al. An indoor augmented-reality evacuation system for the Smartphone using personalized Pedometry , 2012, Human-centric Computing and Information Sciences.
[7] Fouzia Mousumi,et al. Push Pull Services Offering SMS Based m-Banking System in Context of Bangladesh , 2010, Int. Arab. J. e Technol..
[8] Seol-Young Jeong,et al. Self-Organizing Middleware Platform Based on Overlay Network for Real-Time Transmission of Mobile Patients Vital Signal Stream , 2013 .
[9] Hyeong-Gon Jo,et al. Remote service discovery and binding architecture for soft real-time QoS in indoor location-based service , 2014, J. Syst. Archit..
[10] Reijo Savola,et al. Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).
[11] José Luis Fernández Alemán,et al. Security and privacy in electronic health records: A systematic literature review , 2013, J. Biomed. Informatics.
[12] Muhammad Khurram Khan,et al. Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce , 2014, Journal of Medical Systems.
[13] Tom A. M. Kevenaar,et al. A security design for a general purpose, self-organizing, multihop ad hoc wireless network , 2003, SASN '03.
[14] Weiwei Sun,et al. A Distributed Cache Based Reliable Service Execution and Recovery Approach in MANETs , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.
[15] Elijah Blessing Rajsingh,et al. A novel fault tolerant service selection framework for pervasive computing , 2012, Human-centric Computing and Information Sciences.
[16] Annie I. Antón,et al. Towards understanding user perceptions of authentication technologies , 2007, WPES '07.
[17] Md. Imdadul Islam,et al. A New Approach to Fingerprint Detection Using a Combination of Minutiae Points and Invariant Moments Parameters , 2012, J. Inf. Process. Syst..
[18] Melek Önen,et al. A Security Protocol for Self-Organizing Data Storage , 2008, SEC.
[19] Jerome Couturier,et al. How Can the Internet of Things Help to Overcome Current Healthcare Challenges , 2012 .
[20] Sechang Oh,et al. Using an Adaptive Search Tree to Predict User Location , 2012, J. Inf. Process. Syst..
[21] Abdullatif Shikfa. Security issues in opportunistic networks , 2010, MobiOpp '10.
[22] A.C.J. Sprokkereef,et al. ETHICAL PRACTICE IN THE USE OF BIOMETRIC IDENTIFIERS WITHIN THE EU , 2007 .
[23] Ilango Krishnamurthi,et al. Finding relevant semantic association paths through user-specific intermediate entities , 2012, Human-centric Computing and Information Sciences.
[24] Bharat K. Bhargava,et al. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[25] Ravindra C. Thool,et al. SURVEY OF BIOMETRIC RECOGNITION SYSTEMS AND THEIR APPLICATIONS , 2010 .
[26] Kee Yin Joseph Ng. Ubiquitous healthcare: Healthcare systems and applications enabled by mobile and wireless , 2012 .
[27] Giannis F. Marias,et al. Roles and security in a publish/subscribe network architecture , 2010, The IEEE symposium on Computers and Communications.
[28] Adam Krzyzak,et al. Cell Phones Personal Authentication Systems Using Multimodal Biometrics , 2008, ICIAR.
[29] Sébastien Marcel,et al. MOBIO: MOBILE BIOMETRIC FACE AND SPEAKER AUTHENTICATION , 2010 .
[30] Falko Dressler,et al. A study of self-organization mechanisms in ad hoc and sensor networks , 2008, Comput. Commun..
[31] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[32] Tae-Hyon Kim,et al. A three-tier middleware architecture supporting bidirectional location tracking of numerous mobile nodes under legacy WSN environment , 2011, J. Syst. Archit..