A secure Ambient Assisted Living (AAL) environment: An implementation view
暂无分享,去创建一个
V. Vaithyanathan | V. Venkatesh | P. Raj | M. P. Kumar | P. Raj | M. P. Kumar | V. Venkatesh | V. Vaithyanathan
[1] Venkatesh Veeramuthu,et al. Healthcare Data Fusion and Presentation using Service- Oriented Architecture (SOA) Orchestration Mechanism , 2011 .
[2] Ulises Cortés,et al. Intelligent Healthcare Managing: An Assistive Technology Approach , 2007, IWANN.
[3] He Jian,et al. Modeling the Ambient Intelligence Application System: Concept, Software, Data, and Network , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[4] Antonio Brogi,et al. Towards Secure Middleware for Embedded Peer-to-Peer Systems : Objectives & Requirements , 2007 .
[5] Li Xiao,et al. Securing Sensor Nodes Against Side Channel Attacks , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.
[6] Feng Zhou,et al. A Case-Driven Ambient Intelligence System for Elderly in-Home Assistance Applications , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[7] Alejandro Fernández-Montes,et al. A Home E-Health System for Dependent People Based on OSGI , 2009, Intelligent Technical Systems.
[8] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[9] Eric Campo,et al. A review of smart homes - Present state and future challenges , 2008, Comput. Methods Programs Biomed..
[10] Venkatesh Veeramuthu,et al. A Pragmatic Note on Knopflerfish-based Ambient Assisted Living (AAI) Systems Engineering , 2011 .
[11] Juan Carlos Augusto,et al. Ambient Intelligence: The Confluence of Ubiquitous/Pervasive Computing and Artificial Intelligence , 2007 .
[12] Antonio Maña,et al. A Solution Based on Cryptographic Hardware to Protect Agents , 2010, 2010 13th International Conference on Network-Based Information Systems.
[13] Timothy J. Andersen,et al. Leveraging Maven 2 for Agility , 2009, 2009 Agile Conference.
[14] Peter Jorgensen,et al. Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .
[15] Dennis Pfisterer,et al. Comprehensible security synthesis for wireless sensor networks , 2008, MidSens '08.
[16] Juan Carlos Augusto,et al. Ambient Intelligence and Smart Environments: A State of the Art , 2010, Handbook of Ambient Intelligence and Smart Environments.
[17] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .