[1]
|
Vermesan, O. and Friess, P. (2014) Internet of Things Applications—From Research and Innovation to Market Deployment (River Publishers Series in Communications).
|
[2]
|
Tyagi, S., Darwish, A. and Khan, M.Y. (2014) Managing Computing Infrastructure for IoT Data. Advances in Internet of Things, 4, 29-35. http://dx.doi.org/10.4236/ait.2014.43005
|
[3]
|
Ashton, K. (2009) That “Internet of Things” Thing. RFiD Journal, 22, 97-114.
|
[4]
|
Darwish, A., Tyagi, S. and Agarwal, A. (2015) A New Model for IoT Based Healthcare Systems Using Cloud Computing. (Under Publication)
|
[5]
|
Tarouco, L.M.R., Bertholdo, L.M., Granville, L.Z. and Arbiza, L.M.R. (2012) Internet of Things in Healthcare: Interoperatibility and Security Issues. 2012 IEEE International Conference on Communications (ICC), Ottawa, 10-15 June 2012, 621-6125. http://dx.doi.org/10.1109/ICC.2012.6364830
|
[6]
|
Kayarkar, H. (2012) Classification of Various Security Techniques in Databases and Their Comparative Analysis. ACTA Technica Corviniensis, 5, 135-138.
|
[7]
|
Yu, S. (2013) IEEE Standards Association to Exhibit at 2013, International Consumer Electronics Show and Highlight Enabling Consumer Connectivity through Consensus Building. http://standards.ieee.org/news/2013/ces2013.html#sthash.7rFlFzwB.dpuf
|
[8]
|
Schonfeld, E. (2010) Costolo: Twitter Now Has 190 Million Users Tweeting 65 Million Times a Day. http://techcrunch.com/2010/06/08/twitter-190-million-users/
|
[9]
|
Li, W.C., Yi, P., Wu, Y., Pan, L. and Li, J.H. (2014) A New Intrusion Detection Application Based on KNN Classification Algorithm in Wireless Sensor Network. Journal of Electrical and Computer Engineering, 2014, Article ID: 240217. http://dx.doi.org/10.1155/2014/240217
|
[10]
|
Gupta, R.K. and Singh, P. (2013) A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network. International Journal of Emerging Technology and Advanced Engineering, 3, 2250-2459.
|
[11]
|
Yu, L.L., Wang, Z.J. and Wang, W.F. (2012) The Application of Hybrid Encryption Algorithm in Software Security. 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN), Mathura, 3-5 November 2012, 762-765. http://dx.doi.org/10.1109/cicn.2012.195
|
[12]
|
Kessler, G.C. (2013) An Overview of Cryptography. http://www.garykessler.net/library/crypto.html
|
[13]
|
RSA Laboratories—Chryptographic Tools. Section 2.1.5. (Unpublished) http://www.rsa.com/rsalabs/node.asp?id=2174
|
[14]
|
Malan, D., Jones, T.F., Welsh, M. and Moulton, S. (2004) CodeBlue: An Ad-Hoc Sensor Network Infrastructure for Emergency Medical Care. Proceedings of the MobiSys 2004 Workshop on Applications of Mobile Embedded Systems, Boston, 6-9 June 2004.
|
[15]
|
Kumar, P. and Lee, H.-J. (2012) Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey. Sensors, 12, 55-91. http://dx.doi.org/10.3390/s120100055
|
[16]
|
Karulf, E. (2008) Body Area Networks (BAN). A Survey Paper Written under Guidance of Prof. Raj Jain. http://www.cse.wustl.edu/~jain/cse574-08/ftp/ban.pdf
|
[17]
|
Kumar, P., Lee, S.-G. and Lee, H.-J. (2012) E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks. Sensors, 12, 1625-1647. http://dx.doi.org/10.3390/s120201625
|