Wireless telemedicine and m-health: technologies, applications and research issues
暂无分享,去创建一个
Daisuke Takahashi | Jing Liu | Jingyuan Zhang | Yang Xiao | Hongmei Deng | Yang Xiao | Hongmei Deng | D. Takahashi | Jingyuan Zhang | Jing Liu | Daisuke Takahashi
[1] Dov Te'eni,et al. Human-Computer Interaction: Developing Effective Organizational Information Systems , 2006 .
[2] Ieee . Wg. Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification , 2003 .
[3] Yang Xiao,et al. Security overhead and performance for aggregation with fragment retransmission (AFR) in very high-speed wireless 802.11 LANs , 2010, IEEE Transactions on Wireless Communications.
[4] Tarik Taleb,et al. Angelah: a framework for assisting elders at home , 2009, IEEE Journal on Selected Areas in Communications.
[5] Ju Wang,et al. A cross-layer authentication design for secure video transportation in wireless sensor network , 2010, Int. J. Secur. Networks.
[6] Hal B. Jenson,et al. Nelson Textbook of Pediatrics , 1965 .
[7] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[8] Johnny S. Wong,et al. An agent-based framework for intrusion detection alert verification and event correlation , 2008, Int. J. Secur. Networks.
[9] Edward H. Shortliffe,et al. Rule Based Expert Systems: The Mycin Experiments of the Stanford Heuristic Programming Project (The Addison-Wesley series in artificial intelligence) , 1984 .
[10] Jelena V. Misic,et al. Implementation of security policy for clinical information systems over wireless sensor networks , 2007, Ad Hoc Networks.
[11] P. Palatini,et al. Need for a revision of the normal limits of resting heart rate. , 1999, Hypertension.
[12] Sandeep K. S. Gupta,et al. TARA: Thermal-Aware Routing Algorithm for Implanted Sensor Networks , 2005, DCOSS.
[13] Yusheng Ji,et al. Secure and efficient data transmission in RFID sensor networks , 2010, Int. J. Secur. Networks.
[14] Adrian Perrig,et al. Designing user studies for security applications: a case study with wireless network configuration , 2009, Int. J. Secur. Networks.
[15] Sotiris Pavlopoulos,et al. A novel emergency telemedicine system based on wireless communication technology-AMBULANCE , 1998, IEEE Transactions on Information Technology in Biomedicine.
[16] Panayotis G. Cottis,et al. Overview of satellite communication networks security: introduction of EAP , 2009, Int. J. Secur. Networks.
[17] Willis J. Tompkins,et al. A Real-Time QRS Detection Algorithm , 1985, IEEE Transactions on Biomedical Engineering.
[18] Robert F. Mills,et al. Using PLSI-U to detect insider threats by datamining e-mail , 2008, Int. J. Secur. Networks.
[19] Kathy J. Liszka. A Sensor Network Architecture for Cardiac Health Monitoring , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[20] Weili Wu,et al. Handling inheritance violation for secure interoperation of heterogeneous systems , 2009, Int. J. Secur. Networks.
[21] Shahram Latifi,et al. An iris and retina multimodal biometric system , 2008, Int. J. Secur. Networks.
[22] Jim Lansford,et al. HomeRF: wireless networking for the connected home , 2000, IEEE Wirel. Commun..
[23] Jie Wu,et al. An efficient group key management scheme for mobile ad hoc networks , 2009, Int. J. Secur. Networks.
[24] Paul Rabinovich,et al. Secure message delivery in publish/subscribe networks using overlay multicast , 2007, Int. J. Secur. Networks.
[25] Bruce G. Buchanan,et al. The MYCIN Experiments of the Stanford Heuristic Programming Project , 1985 .
[26] Xiaoqi Ma,et al. Verifying security protocols by knowledge analysis , 2008, Int. J. Secur. Networks.
[27] Simon Kay,et al. Telemedicine Theory and Practice , 1997 .
[28] Ren-Junn Hwang,et al. An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks , 2010, Int. J. Secur. Networks.
[29] Mooi Choo Chuah,et al. Syntax vs. semantics: competing approaches to dynamic network intrusion detection , 2008, Int. J. Secur. Networks.
[30] Ali Movaghar-Rahimabadi,et al. Anonymous authentication protocol for GSM networks , 2008, Int. J. Secur. Networks.
[31] Hsiao-Hwa Chen,et al. DKMS: distributed hierarchical access control for multimedia networks , 2007, Int. J. Secur. Networks.
[32] David S. Rosenbaum,et al. Remote Monitoring of a Heterogeneous Sensor Network for Biomedical Research in Space , 2004, International Conference on Wireless Networks.
[33] Sencun Zhu,et al. LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network , 2007, Int. J. Secur. Networks.
[34] Javier Herranz,et al. Aggregate designated verifier signatures and application to secure routing , 2007, Int. J. Secur. Networks.
[35] Robert F. Mills,et al. An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols , 2012, Int. J. Secur. Networks.
[36] Noureddine Boudriga,et al. Visibility: a novel concept for characterising provable network digital evidences , 2009, Int. J. Secur. Networks.
[37] Robert Tappan Morris,et al. a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.
[38] Pieter H. Hartel,et al. Secure pairing with biometrics , 2009, Int. J. Secur. Networks.
[39] Li Xu,et al. Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks , 2010, Int. J. Secur. Networks.
[40] Ari T. Adler,et al. A cost-effective portable telemedicine kit for use in Developing countries , 2000 .
[41] Ying Li,et al. Enhancing Intrusion Detection System with proximity information , 2010, Int. J. Secur. Networks.
[42] Fei Hu,et al. Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009 .
[43] Riccardo Bettati,et al. Analysis of flow-correlation attacks in anonymity network , 2007, Int. J. Secur. Networks.
[44] Lillykutty Jacob,et al. Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks , 2008, Int. J. Secur. Networks.
[45] Francesco Chiti,et al. An integrated communications framework for context aware continuous monitoring with body sensor networks , 2009, IEEE Journal on Selected Areas in Communications.
[46] Abdelmadjid Bouabdallah,et al. TKS: a transition key management scheme for secure application level multicast , 2009, Int. J. Secur. Networks.
[47] Xukai Zou,et al. A novel Conference Key Management solution for Secure Dynamic Conferencing , 2008, Int. J. Secur. Networks.
[48] David W. York,et al. Embedded Web Technology: Applying World Wide Web Standards to Embedded Systems , 2001 .
[49] A. Tamilarasi,et al. A backpressure technique for filtering spoofed traffic at upstream routers , 2010, Int. J. Secur. Networks.
[50] Djamel Djenouri,et al. Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks , 2009, Int. J. Secur. Networks.
[51] Jianping Pan,et al. Vulnerabilities in distance-indexed IP traceback schemes , 2007, Int. J. Secur. Networks.
[52] Sukumar Nandi,et al. Secure user-identification and key distribution scheme preserving anonymity , 2008, Int. J. Secur. Networks.
[53] Daisuke Takahashi,et al. Temperature-Aware Routing for Telemedicine Applications in Embedded Biomedical Sensor Networks , 2008, EURASIP J. Wirel. Commun. Netw..
[54] Sunil Kumar,et al. QoS considerations in wireless sensor networks for telemedicine , 2003, SPIE ITCom.
[55] R. Wells,et al. Telemedicine: Explorations in the Use of Telecommunications in Health Care. , 1976 .
[56] Xiaowen Zhang,et al. Looking at a class of RFID APs through GNY logic , 2010, Int. J. Secur. Networks.
[57] R T Turner,et al. Invited review: what do we know about the effects of spaceflight on bone? , 2000, Journal of applied physiology.
[58] Ding-Zhu Du,et al. An one-way function based framework for pairwise key establishment in sensor networks , 2008, Int. J. Secur. Networks.
[59] Guang Gong,et al. Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks , 2007, Int. J. Secur. Networks.
[60] Dijiang Huang. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks , 2007, Int. J. Secur. Networks.
[61] Aleksandar Milenkovic,et al. Journal of Neuroengineering and Rehabilitation Open Access a Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation , 2005 .
[62] René Mayrhofer,et al. Secure Spontaneous Interaction, Special issue, International Journal of Security and Networks Volume 4 Nos. 1/2 , 2009 .
[63] Jeffrey C. Bauer,et al. Telemedicine and the reinvention of healthcare , 1999 .
[64] Panayiotis Kotzanikolaou,et al. Multilayer key establishment for large-scale sensor networks , 2008, Int. J. Secur. Networks.
[65] Robert A. Malaney. Securing Wi-Fi networks with position verification: extended version , 2007, Int. J. Secur. Networks.
[66] Benjamin W. P. Ramsey,et al. Subjective audio quality over a secure IEEE 802.11n network , 2011, Int. J. Secur. Networks.
[67] Bharat K. Bhargava,et al. Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .
[68] Eric Dishman,et al. Inventing wellness systems for aging in place , 2004, Computer.
[69] Li Bai,et al. A Proactive Secret Sharing Scheme in matrix projection method , 2009, Int. J. Secur. Networks.
[70] Krishna M. Sivalingam,et al. An efficient One-Time Password authentication scheme using a smart card , 2009, Int. J. Secur. Networks.
[71] Mark Gaynor,et al. Human Computer Interaction in the Pre-Hospital Setting , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[72] Tzong-Chen Wu,et al. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks , 2010, Int. J. Secur. Networks.
[73] Kiseon Kim,et al. Security assessments of IEEE 802.15.4 standard based on X.805 framework , 2010, Int. J. Secur. Networks.
[74] Mukesh Singhal,et al. An escrow-less identity-based group-key agreement protocol for dynamic peer groups , 2009, Int. J. Secur. Networks.
[75] Richard Martin,et al. Design for wearability , 1998, Digest of Papers. Second International Symposium on Wearable Computers (Cat. No.98EX215).
[76] Constantinos S. Pattichis,et al. Multipurpose health care telemedicine system , 2001, 2001 Conference Proceedings of the 23rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[77] Manmeet Mahinderjit Singh,et al. Trust in RFID-enabled Supply-Chain Management , 2010, Int. J. Secur. Networks.
[78] Aleksandar Milenkovic,et al. Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..
[79] Carmen C. Y. Poon,et al. Cuff-less and Noninvasive Measurements of Arterial Blood Pressure by Pulse Transit Time , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[80] Michaël Rusinowitch,et al. Efficient decision tree for protocol analysis in intrusion detection , 2010, Int. J. Secur. Networks.
[81] Sandeep K. S. Gupta,et al. Energy-efficient protocols for wireless communication in biosensor networks , 2001, 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. PIMRC 2001. Proceedings (Cat. No.01TH8598).
[82] Constantinos E. Goutis,et al. Server side hashing core exceeding 3 Gbps of throughput , 2007, Int. J. Secur. Networks.
[83] Martin Feldhofer,et al. On the security of RFID devices against implementation attacks , 2010, Int. J. Secur. Networks.
[84] Barry E. Mullins,et al. Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks , 2007, Int. J. Secur. Networks.
[85] Sven Laur,et al. User-aided data authentication , 2009, Int. J. Secur. Networks.
[86] Fei Hu,et al. Towards a Secure, RFID / Sensor Based Telecardiology System , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[87] Keith Mayes,et al. An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing , 2010, Int. J. Secur. Networks.
[88] Indrajit Ray,et al. Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents , 2008, Int. J. Secur. Networks.
[89] Liqun Chen,et al. On security proof of McCullagh?Barreto's key agreement protocol and its variants , 2007, Int. J. Secur. Networks.
[90] Yuan-Ting Zhang,et al. Implementation of a WAP-based telemedicine system for patient monitoring , 2003, IEEE Transactions on Information Technology in Biomedicine.
[91] Gregory D. Abowd,et al. The Aware Home: A living laboratory for technologies for successful aging , 2002 .
[92] Peng Liu,et al. Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.
[93] M. W. Raad. A ubiquitous mobile telemedicine system for the elderly using RFID , 2010, Int. J. Secur. Networks.
[94] Ming-Hour Yang,et al. Lightweight authentication protocol for mobile RFID networks , 2010, Int. J. Secur. Networks.
[95] Yuan-Ting Zhang,et al. Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[96] Marios S. Pattichis,et al. Wireless telemedicine systems: an overview , 2002 .
[97] Yi Pan,et al. Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs , 2006, Int. J. Wirel. Mob. Comput..
[98] N. Asokan,et al. Standards for security associations in personal networks: a comparative analysis , 2009, Int. J. Secur. Networks.
[99] Mostafa A. Bassiouni,et al. Energy Efficient Thermal Aware Routing Algorithms for Embedded Biomedical Sensor Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[100] Zhoujun Li,et al. Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security , 2010, Int. J. Secur. Networks.
[101] Susana Garrido Azevedo,et al. Radio frequency identification: a case study of healthcare organisations , 2010, Int. J. Secur. Networks.
[102] Huaxiong Wang,et al. Efficient multicast stream authentication for the fully adversarial network model , 2007, Int. J. Secur. Networks.
[103] P. Bonato,et al. Wearable sensors/systems and their impact on biomedical engineering , 2003, IEEE Engineering in Medicine and Biology Magazine.
[104] Yang Xiao,et al. Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining , 2008, Ad Hoc Networks.
[105] Emil Jovanov,et al. Guest Editorial Introduction to the Special Section on M-Health: Beyond Seamless Mobility and Global Wireless Health-Care Connectivity , 2004, IEEE Transactions on Information Technology in Biomedicine.
[106] Haiping Xu,et al. Formal modelling and analysis of XML firewall for service-oriented systems , 2008, Int. J. Secur. Networks.
[107] Adel Bouhoula,et al. Firewall filtering rules analysis for anomalies detection , 2008, Int. J. Secur. Networks.
[108] Yang Xiao,et al. Voice and video transmissions with global data parameter control for the IEEE 802.11e enhance distributed channel access , 2004, IEEE Transactions on Parallel and Distributed Systems.
[109] Masoud Salehi,et al. Communication Systems Engineering , 1994 .
[110] Qijun Gu,et al. Defence against packet injection in ad hoc networks , 2007, Int. J. Secur. Networks.
[111] Matt Welsh,et al. CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care , 2004 .
[112] Sandeep K. S. Gupta,et al. Towards a propagation model for wireless biomedical applications , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[113] Sujeet Shenoi,et al. Forensic analysis of SCADA systems and networks , 2008, Int. J. Secur. Networks.
[114] Sandeep K. S. Gupta,et al. Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..
[115] H. Jonathan Chao,et al. Design and analysis of a multipacket signature detection system , 2007, Int. J. Secur. Networks.
[116] Chao Chen,et al. On the scalability of Delay-Tolerant Botnets , 2010, Int. J. Secur. Networks.
[117] Cynthia Furse,et al. An implantable antenna for communication with implantable medical devices , 2000 .
[118] Ricardo Dahab,et al. On the design of secure protocols for hierarchical sensor networks , 2007, Int. J. Secur. Networks.
[119] Hong Gu,et al. A review of telemedicine in China , 2009, Journal of telemedicine and telecare.
[120] Yang Xiao,et al. Radio frequency identification: technologies, applications, and research issues , 2007, Wirel. Commun. Mob. Comput..
[121] Yang Xiao,et al. Temporal Key Integrity Protocol and Its Security Issues in IEEE 802.11i , 2007 .
[122] Yang Xiao,et al. Low-cost wireless sensor networks for remote cardiac patients monitoring applications , 2008, Wirel. Commun. Mob. Comput..
[123] Kamil Saraç,et al. Single packet IP traceback in AS-level partial deployment scenario , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[124] Hhs Office for Civil Rights. Standards for privacy of individually identifiable health information. Final rule. , 2002, Federal register.
[125] P. Bonato,et al. Data mining of motor patterns recorded with wearable technology , 2003, IEEE Engineering in Medicine and Biology Magazine.
[126] Jelena Misic,et al. On Security Attacks in HealthcareWSNs Implemented on 802.15.4 Beacon Enabled Clusters , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[127] Matt Welsh,et al. Sensor networks for medical care , 2005, SenSys '05.
[128] Taieb Znati,et al. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks , 2007, Int. J. Secur. Networks.
[129] Raheem A. Beyah,et al. Using link RTT to passively detect unapproved wireless nodes , 2009, Int. J. Secur. Networks.
[130] Indrajit Ray,et al. Origins: an approach to trace fast spreading worms to their roots , 2008, Int. J. Secur. Networks.
[131] Robert F. Mills,et al. Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees , 2010, Int. J. Secur. Networks.
[132] Qi Hao,et al. Congestion-aware, loss-resilient bio-monitoring sensor networking for mobile health applications , 2009, IEEE Journal on Selected Areas in Communications.
[133] Mark J. Rodrigues,et al. Perceived barriers to the widespread commercial use of Radio Frequency Identification technology , 2010, Int. J. Secur. Networks.
[134] Sandeep K. S. Gupta,et al. Research challenges in wireless networks of biomedical sensors , 2001, MobiCom '01.
[135] Jie Wu,et al. Clique-based group key assignment in Wireless Sensor Networks , 2008, Int. J. Secur. Networks.
[136] Chao Chen,et al. Deriving a closed-form expression for worm-scanning strategies , 2009, Int. J. Secur. Networks.
[137] Pei Cao,et al. Hash-AV: fast virus signature scanning by cache-resident filters , 2005, GLOBECOM.
[138] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[139] Fahim Sufi,et al. Novel methods of faster cardiovascular diagnosis in wireless telecardiology , 2009, IEEE Journal on Selected Areas in Communications.
[140] A. Dutta-Roy,et al. Networks for homes , 1999 .
[141] Yi-Bing Lin,et al. NTP-DownloadT: a conformance test tool for secured mobile download services , 2008, Int. J. Secur. Networks.
[142] Max E. Stachura,et al. Delivering Diagnostic Quality Video over Mobile Wireless Networks for Telemedicine , 2009, International journal of telemedicine and applications.
[143] Sylvie Perreau,et al. Detect DDoS flooding attacks in mobile ad hoc networks , 2010, Int. J. Secur. Networks.
[144] Eyal de Lara,et al. Proximity-based authentication of mobile devices , 2009, Int. J. Secur. Networks.
[145] David S. Rosenbaum,et al. Keeping a beat on the heart , 2004, IEEE Pervasive Computing.
[146] Yacine Challal,et al. Adaptive clustering for scalable key management in dynamic group communications , 2008, Int. J. Secur. Networks.
[147] David E. Culler,et al. Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.
[148] Georgios Kalogridis,et al. Privacy protection system and metrics for hiding electrical events , 2011, Int. J. Secur. Networks.
[149] Chuanyi Ji,et al. Optimal worm-scanning method using vulnerable-host distributions , 2007, Int. J. Secur. Networks.
[150] Josef Hallberg,et al. Wearable systems in nursing home care: prototyping experience , 2006, IEEE Pervasive Computing.
[151] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[152] Fei Hu,et al. Towards a realistic testbed for wireless network reliability and security performance studies , 2008, Int. J. Secur. Networks.
[153] Thomas Magedanz,et al. Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks , 2009, Int. J. Secur. Networks.
[154] Claudio Soriente,et al. Secure pairing of interface constrained devices , 2009, Int. J. Secur. Networks.
[155] Bing Wu,et al. Experimental analysis of application-level intrusion detection algorithms , 2010, Int. J. Secur. Networks.
[156] Antonio F. Gómez-Skarmeta,et al. An Ambient Assisted Living System for Telemedicine with Detection of Symptoms , 2009, IWINAC.
[157] Yang Xiao,et al. Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..
[158] Robin Berthier,et al. An evaluation of connection characteristics for separating network attacks , 2009, Int. J. Secur. Networks.
[159] Hua Wang,et al. Security and privacy in RFID systems: [special issue of International Journal of Security and Networks] , 2010 .
[160] Jie Wu,et al. PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks , 2008, Int. J. Secur. Networks.
[161] Bodo Möller,et al. Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol , 2007, Int. J. Secur. Networks.
[162] IstepanianR. S.H.,et al. Guest Editorial Introduction to the Special Section on M-Health , 2004 .
[163] William C. Mann,et al. Enabling location-aware pervasive computing applications for the elderly , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[164] L. Sun,et al. Security and privacy on low-cost Radio Frequency Identification systems , 2010, Int. J. Secur. Networks.
[165] Mark A. Shayman,et al. On pairwise connectivity of wireless multihop networks , 2007, Int. J. Secur. Networks.
[166] E Krupinski,et al. Efficiency analysis of a multi-specialty telemedicine service. , 1999, Telemedicine journal : the official journal of the American Telemedicine Association.
[167] Matt Welsh,et al. Ad-hoc multicast routing on resource-limited sensor nodes , 2006, REALMAN '06.
[168] Carmen C. Y. Poon,et al. A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.
[169] Daniel W. Jones,et al. Seventh report of the Joint National Committee on Prevention, Detection, Evaluation, and Treatment of High Blood Pressure. , 2003, Hypertension.
[170] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[171] Claudio Soriente,et al. Using audio in secure device pairing , 2009, Int. J. Secur. Networks.
[172] J. Ruskin,et al. Electrical alternans and vulnerability to ventricular arrhythmias. , 1994, The New England journal of medicine.
[173] J. Bussmann,et al. Quantification of physical activities by means of ambulatory accelerometry: a validation study. , 1998, Psychophysiology.
[174] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[175] Pin-Han Ho,et al. A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks , 2008, Int. J. Secur. Networks.
[176] MATIHEW B. LAU. GEOPAK : MONITORING CLIMBERS AND CLIMATE ON MOUNT EVEREST , 2006 .
[177] Merryn J Mathie,et al. Accelerometry: providing an integrated, practical method for long-term, ambulatory monitoring of human movement , 2004, Physiological measurement.
[178] Nirwan Ansari,et al. Adaptive trust-based anonymous network , 2007, Int. J. Secur. Networks.
[179] Yang Xiao,et al. Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare , 2009, Wirel. Commun. Mob. Comput..
[180] Jianqing Zhang,et al. Application-Aware Secure Multicast for Power Grid Communications , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[181] Yang Xiao,et al. Attacks and countermeasures in multi-hop Cognitive Radio Networks , 2009, Int. J. Secur. Networks.
[182] Micah Sherr,et al. On the (un)reliability of eavesdropping , 2008, Int. J. Secur. Networks.
[183] Frances Storlie. RAPID INTERPRETATION OF EKGs , 1975 .
[184] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[185] Loren Schwiebert,et al. A biomedical smart sensor for the visually impaired , 2002, Proceedings of IEEE Sensors.
[186] Fagen Li,et al. ID-based threshold proxy signcryption scheme from bilinear pairings , 2008, Int. J. Secur. Networks.
[187] Shiuh-Pyng Shieh,et al. Authentication and secret search mechanisms for RFID-aware wireless sensor networks , 2010, Int. J. Secur. Networks.
[188] G. R. Schwartz,et al. Principles and practice of emergency medicine , 1978 .
[189] Deepa Kundur,et al. Towards modelling the impact of cyber attacks on a smart grid , 2011, Int. J. Secur. Networks.
[190] Hongyi Wu,et al. Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations , 2006, IEEE Transactions on Mobile Computing.