Communication systems engineering
Communication systems engineering
IEEE Spectrum
Research challenges in wireless networks of biomedical sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Energy-Efficient Communication Protocol for Wireless Microsensor Networks
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 8 - Volume 8
Enabling Location-Aware Pervasive Computing Applications for the Edlerly
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
ISWC '98 Proceedings of the 2nd IEEE International Symposium on Wearable Computers
A high-throughput path metric for multi-hop wireless routing
Proceedings of the 9th annual international conference on Mobile computing and networking
Taming the underlying challenges of reliable multihop routing in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
IEEE Transactions on Parallel and Distributed Systems
IEEE Pervasive Computing
Human-Computer Interaction: Developing Effective Organizational Information Systems
Human-Computer Interaction: Developing Effective Organizational Information Systems
Rule Based Expert Systems: The Mycin Experiments of the Stanford Heuristic Programming Project (The Addison-Wesley series in artificial intelligence)
Sensor networks for medical care
Proceedings of the 3rd international conference on Embedded networked sensor systems
Wearable Systems in Nursing Home Care: Prototyping Experience
IEEE Pervasive Computing
Mobile Telemedicine Sensor Networks with Low-Energy Data Query and Network Lifetime Considerations
IEEE Transactions on Mobile Computing
Ad-hoc multicast routing on resource-limited sensor nodes
REALMAN '06 Proceedings of the 2nd international workshop on Multi-hop ad hoc networks: from theory to reality
Radio frequency identification: technologies, applications, and research issues: Research Articles
Wireless Communications & Mobile Computing
Human Computer Interaction in the Pre-Hospital Setting
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs
International Journal of Wireless and Mobile Computing
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Forensic analysis of SCADA systems and networks
International Journal of Security and Networks
On the (un)reliability of eavesdropping
International Journal of Security and Networks
Using PLSI-U to detect insider threats by datamining e-mail
International Journal of Security and Networks
A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks
International Journal of Security and Networks
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
Efficient multicast stream authentication for the fully adversarial network model
International Journal of Security and Networks
Aggregate designated verifier signatures and application to secure routing
International Journal of Security and Networks
International Journal of Security and Networks
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Server side hashing core exceeding 3 Gbps of throughput
International Journal of Security and Networks
Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks
International Journal of Security and Networks
On security proof of McCullagh Barreto's key agreement protocol and its variants
International Journal of Security and Networks
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
International Journal of Security and Networks
Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
Multilayer key establishment for large-scale sensor networks
International Journal of Security and Networks
Visualisation of wormholes in underwater sensor networks: a distributed approach
International Journal of Security and Networks
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
International Journal of Security and Networks
Origins: an approach to trace fast spreading worms to their roots
International Journal of Security and Networks
A novel Conference Key Management solution for Secure Dynamic Conferencing
International Journal of Security and Networks
Anonymous authentication protocol for GSM networks
International Journal of Security and Networks
Towards a realistic testbed for wireless network reliability and security performance studies
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
Adaptive trust-based anonymous network
International Journal of Security and Networks
Securing Wi-Fi networks with position verification: extended version
International Journal of Security and Networks
On pairwise connectivity of wireless multihop networks
International Journal of Security and Networks
Hash-AV: fast virus signature scanning by cache-resident filters
International Journal of Security and Networks
Secure message delivery in publish/subscribe networks using overlay multicast
International Journal of Security and Networks
Optimal worm-scanning method using vulnerable-host distributions
International Journal of Security and Networks
Vulnerabilities in distance-indexed IP traceback schemes
International Journal of Security and Networks
Single packet IP traceback in AS-level partial deployment scenario
International Journal of Security and Networks
End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks
International Journal of Security and Networks
Design and analysis of a multipacket signature detection system
International Journal of Security and Networks
Analysis of flow-correlation attacks in anonymity network
International Journal of Security and Networks
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Temperature-aware routing for telemedicine applications in embedded biomedical sensor networks
EURASIP Journal on Wireless Communications and Networking - Wireless Telemedicine and Applications
Low-cost wireless sensor networks for remote cardiac patients monitoring applications
Wireless Communications & Mobile Computing
Formal modelling and analysis of XML firewall for service-oriented systems
International Journal of Security and Networks
Firewall filtering rules analysis for anomalies detection
International Journal of Security and Networks
PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks
International Journal of Security and Networks
Verifying security protocols by knowledge analysis
International Journal of Security and Networks
An agent-based framework for intrusion detection alert verification and event correlation
International Journal of Security and Networks
Secure user-identification and key distribution scheme preserving anonymity
International Journal of Security and Networks
ID-based threshold proxy signcryption scheme from bilinear pairings
International Journal of Security and Networks
An one-way function based framework for pairwise key establishment in sensor networks
International Journal of Security and Networks
Clique-based group key assignment in Wireless Sensor Networks
International Journal of Security and Networks
NTP-DownloadT: a conformance test tool for secured mobile download services
International Journal of Security and Networks
An iris and retina multimodal biometric system
International Journal of Security and Networks
Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks
International Journal of Security and Networks
Error-resistant RFID-assisted wireless sensor networks for cardiac telehealthcare
Wireless Communications & Mobile Computing
Proximity-based authentication of mobile devices
International Journal of Security and Networks
Secure pairing of interface constrained devices
International Journal of Security and Networks
Secure pairing with biometrics
International Journal of Security and Networks
Seeing-Is-Believing: using camera phones for human-verifiable authentication
International Journal of Security and Networks
Using audio in secure device pairing
International Journal of Security and Networks
User-aided data authentication
International Journal of Security and Networks
Standards for security associations in personal networks: a comparative analysis
International Journal of Security and Networks
Designing user studies for security applications: a case study with wireless network configuration
International Journal of Security and Networks
An evaluation of connection characteristics for separating network attacks
International Journal of Security and Networks
An efficient group key management scheme for mobile ad hoc networks
International Journal of Security and Networks
Deriving a closed-form expression for worm-scanning strategies
International Journal of Security and Networks
An efficient One-Time Password authentication scheme using a smart card
International Journal of Security and Networks
Using link RTT to passively detect unapproved wireless nodes
International Journal of Security and Networks
Overview of satellite communication networks security: introduction of EAP
International Journal of Security and Networks
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks
International Journal of Security and Networks
An Ambient Assisted Living System for Telemedicine with Detection of Symptoms
IWINAC '09 Proceedings of the 3rd International Work-Conference on The Interplay Between Natural and Artificial Computation: Part II: Bioinspired Applications in Artificial and Natural Computation
A Proactive Secret Sharing Scheme in matrix projection method
International Journal of Security and Networks
TKS: a transition key management scheme for secure application level multicast
International Journal of Security and Networks
Handling inheritance violation for secure interoperation of heterogeneous systems
International Journal of Security and Networks
Visibility: a novel concept for characterising provable network digital evidences
International Journal of Security and Networks
Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks
International Journal of Security and Networks
Attacks and countermeasures in multi-hop Cognitive Radio Networks
International Journal of Security and Networks
Delivering diagnostic quality video over mobile wireless networks for telemedicine
International Journal of Telemedicine and Applications
Wireless sensor networks for personal health monitoring: Issues and an implementation
Computer Communications
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
Congestion-aware, loss-resilient bio-monitoring sensor networking for mobile health applications
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
ANGELAH: a framework for assisting elders at home
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
Novel methods of faster cardiovascular diagnosis in wireless telecardiology
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
A backpressure technique for filtering spoofed traffic at upstream routers
International Journal of Security and Networks
Authentication and secret search mechanisms for RFID-aware wireless sensor networks
International Journal of Security and Networks
An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks
International Journal of Security and Networks
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
International Journal of Security and Networks
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
International Journal of Security and Networks
Lightweight authentication protocol for mobile RFID networks
International Journal of Security and Networks
A cross-layer authentication design for secure video transportation in wireless sensor network
International Journal of Security and Networks
An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing
International Journal of Security and Networks
International Journal of Security and Networks
Trust in RFID-enabled Supply-Chain Management
International Journal of Security and Networks
On the security of RFID devices against implementation attacks
International Journal of Security and Networks
Secure and efficient data transmission in RFID sensor networks
International Journal of Security and Networks
Security and privacy on low-cost Radio Frequency Identification systems
International Journal of Security and Networks
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
Radio frequency identification: a case study of healthcare organisations
International Journal of Security and Networks
A ubiquitous mobile telemedicine system for the elderly using RFID
International Journal of Security and Networks
Perceived barriers to the widespread commercial use of Radio Frequency Identification technology
International Journal of Security and Networks
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security
International Journal of Security and Networks
Security assessments of IEEE 802.15.4 standard based on X.805 framework
International Journal of Security and Networks
Experimental analysis of application-level intrusion detection algorithms
International Journal of Security and Networks
IEEE Transactions on Wireless Communications
Enhancing Intrusion Detection System with proximity information
International Journal of Security and Networks
Efficient decision tree for protocol analysis in intrusion detection
International Journal of Security and Networks
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols
International Journal of Security and Networks
On the scalability of Delay-Tolerant Botnets
International Journal of Security and Networks
Detect DDoS flooding attacks in mobile ad hoc networks
International Journal of Security and Networks
Towards modelling the impact of cyber attacks on a smart grid
International Journal of Security and Networks
Privacy protection system and metrics for hiding electrical events
International Journal of Security and Networks
Secure and privacy-preserving information aggregation for smart grids
International Journal of Security and Networks
Application-aware secure multicast for power grid communications
International Journal of Security and Networks
Subjective audio quality over a secure IEEE 802.11n network
International Journal of Security and Networks
TARA: thermal-aware routing algorithm for implanted sensor networks
DCOSS'05 Proceedings of the First IEEE international conference on Distributed Computing in Sensor Systems
A novel emergency telemedicine system based on wireless communication technology-AMBULANCE
IEEE Transactions on Information Technology in Biomedicine
Implementation of a WAP-based telemedicine system for patient monitoring
IEEE Transactions on Information Technology in Biomedicine
IEEE Transactions on Information Technology in Biomedicine
Security and privacy in RFID and applications in telemedicine
IEEE Communications Magazine
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
IEEE Communications Magazine
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
Time-frequency analysis of terahertz radar signal for vital signs sensing based on radar sensor
International Journal of Sensor Networks
Hi-index | 0.00 |
Telemedicine is not medicine, but it is used to compute, to communicate and to deliver high-quality medical care regardless of location. It reduces cost, time and resources. Furthermore, wireless technologies play significant roles in telemedicine, and they are therefore called wireless telemedicine or mobile-health. This paper provides a comprehensive survey on wireless telemedicine, including the relevant wireless technologies, applications and research issues.