Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society
暂无分享,去创建一个
Abdelouahid Derhab | Jalal Al-Muhtadi | Kashif Saleem | Basit Shahzad | J. Al-Muhtadi | A. Derhab | K. Saleem | B. Shahzad
[1] Sherali Zeadally,et al. Machine-to-Machine (M2M) Communications in Vehicular Networks , 2012 .
[2] Kijoon Chae,et al. An Improved Security Approach Based on Kerberos for M2M Open IPTV System , 2012, 2012 15th International Conference on Network-Based Information Systems.
[3] William Stallings,et al. Cryptography and network security , 1998 .
[4] Context-Aware Computing,et al. Inferring Activities from Interactions with Objects , 2004 .
[5] Kashif Saleem,et al. An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARP , 2011, CISIS.
[6] Gu-Yeon Wei,et al. A portable, low-power, wireless two-lead EKG system , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[7] Jin Cao,et al. Security Issues on Machine to Machine Communications , 2012, KSII Trans. Internet Inf. Syst..
[8] Guiran Chang,et al. A Survey on Security Issues of M2M Communications in Cyber-Physical Systems , 2012, KSII Trans. Internet Inf. Syst..
[9] Jae Eun Chung,et al. Social interaction in online support groups: Preference for online social interaction over offline social interaction , 2013, Comput. Hum. Behav..
[10] J. Jenifer,et al. Wireless Machine-To-Machine Healthcare Solution Using Android Mobile Devices In Global Networks , 2014 .
[11] Sungmo Jung,et al. An Optimization Scheme for M2M-Based Patient Monitoring in Ubiquitous Healthcare Domain , 2012, Int. J. Distributed Sens. Networks.
[12] Jeff A. Bilmes,et al. Recognizing Activities and Spatial Context Using Wearable Sensors , 2006, UAI.
[13] Zheng Zhou,et al. A security authentication scheme in machine-to-machine home network service , 2015, Secur. Commun. Networks.
[14] B. Kröse,et al. Bayesian Activity Recognition in Residence for Elders , 2007 .
[15] Christopher G. Atkeson,et al. Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors , 2005, Pervasive.
[16] Eric Dishman,et al. Inventing wellness systems for aging in place , 2004, Computer.
[17] Norsheila Fisal,et al. Cross layer based biological inspired self-organized routing protocol for wireless sensor network , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.
[18] Mohsen Guizani,et al. Home M2M networks: Architectures, standards, and QoS improvement , 2011, IEEE Communications Magazine.
[19] Liangli Ma,et al. RISE: A RelIable and SEcure scheme for wireless Machine to Machine communications , 2013 .
[20] Norsheila Fisal,et al. Biological inspired self-optimized routing algorithm for wireless sensor networks , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).
[21] Theodore S. Rappaport,et al. A Survey of Recent Developments in Home M2M Networks , 2013, IEEE Communications Surveys & Tutorials.
[22] Matt Welsh,et al. Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.
[23] Basit Shahzad,et al. Risk Mitigation And Management Scheme Based On Risk Priority , 2010 .
[24] Abdelouahid Derhab,et al. Low delay and secure M2M communication mechanism for eHealthcare , 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom).
[25] Zhong Fan,et al. M2M communications for e-health: Standards, enabling technologies, and research challenges , 2012, 2012 6th International Symposium on Medical Information and Communication Technology (ISMICT).
[26] Kashif Saleem. QoS provisioning for real time services in MPLS diffserv aware IPv6 network using IXP-2xxx (Intel Network Processor) , 2006 .
[27] Xiaohui Liang,et al. HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks , 2012, Comput. Commun..
[28] Inhyok Cha,et al. Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.
[29] Noriaki Kuwahara,et al. Practical Design of A Sensor Network for Understanding Nursing Activities , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[30] Mehmet A. Orgun,et al. Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[31] Kashif Saleem,et al. Enhanced Ant Colony algorithm for self-optimized data assured routing in wireless sensor networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[32] Kashif Saleem,et al. Empirical Studies of Bio-Inspired Self-Organized Secure Autonomous Routing Protocol , 2014, IEEE Sensors Journal.
[33] Victor C. M. Leung,et al. A Survey of Recent Developments in Home M2M Networks , 2014, IEEE Commun. Surv. Tutorials.
[34] Kun-Ho Yoon,et al. M2M-based smart health service for human UI/UX using motion recognition , 2014, Cluster Computing.
[35] Edmundo Monteiro,et al. Security Issues and Approaches on Wireless M2M Systems , 2013, Wireless Networks and Security.
[36] Abraham O. Fapojuwo,et al. A Survey of System Architecture Requirements for Health Care-Based Wireless Sensor Networks , 2011, Sensors.
[37] Sherali Zeadally,et al. Machine-to-Machine (M2M) Communications in Vehicular Networks , 2012, KSII Trans. Internet Inf. Syst..
[38] Gita Reese Sukthankar,et al. Motif Discovery and Feature Selection for CRF-based Activity Recognition , 2010, 2010 20th International Conference on Pattern Recognition.
[39] Abdullah S. Al-Mudimigh,et al. Risk Identification, Mitigation and Avoidance Model for Handling Software Risk , 2010, 2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks.
[40] Jesse Hoey,et al. The use of an intelligent prompting system for people with dementia , 2007, Interactions.
[41] Suleiman Zubair,et al. Assessing Routing Strategies for Cognitive Radio Sensor Networks , 2013, Sensors.
[42] Eui-nam Huh,et al. A dynamic ID-based authentication scheme , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[43] Chris Toumazou,et al. Medical Healthcare Monitoring with Wearable and Implantable Sensors , 2004 .
[44] Saudi Arabia,et al. Software Risk Management and Avoidance Strategy , 2011 .
[45] Merryn J Mathie,et al. Accelerometry: providing an integrated, practical method for long-term, ambulatory monitoring of human movement , 2004, Physiological measurement.
[46] William Stallings,et al. Cryptography and Network Security (4th Edition) , 2005 .
[47] Min Chen,et al. Machine-to-Machine Communications: Architectures, Standards and Applications , 2012, KSII Trans. Internet Inf. Syst..