Author of the publication

Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey.

, and . Sensors, 12 (1): 55-91 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a Parallel-Type Gripper Mechanism., , , , , , and . I. J. Robotics Res., 21 (7): 661-678 (2002)Performance Analysis of Sawing Based on Impulse Measure and Geometry - Dublahal Arm Approach., , , and . IEEE Trans. Robotics, 21 (6): 1230-1240 (2005)An effective framework of behavior detection-advanced static analysis for malware detection., , , and . ISCIT, page 361-365. IEEE, (2014)Hybrid Cloud Service Based Healthcare Solutions., , , , and . AINA Workshops, page 25-30. IEEE Computer Society, (2015)Personal Healthcare Information System., , and . NCM, page 1540-1545. IEEE Computer Society, (2009)Database design for global patient monitoring applications using WAP., and . Int. Conf. Interaction Sciences, volume 403 of ACM International Conference Proceeding Series, page 25-31. ACM, (2009)Adaptive Technique for Fluorescence Enhanced Optical Tomography Using Tetrahedral Dual-Mesh., , and . ISBI, page 1376-1379. IEEE, (2007)An energy consumption technique for global healthcare monitoring applications., , and . Int. Conf. Interaction Sciences, volume 403 of ACM International Conference Proceeding Series, page 539-542. ACM, (2009)Dragon: A Fast Word Based Stream Cipher., , , , , , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 33-50. Springer, (2004)Highly Reliable Synchronous Stream Cipher System for Link Encryption.. ICCSA (3), volume 3982 of Lecture Notes in Computer Science, page 269-278. Springer, (2006)