Digital Library
Vol. 7, No. 5, May 30, 2013
[Regular Papers]
Special Issue: Machine 2 Machine Communications: Applications, Architectures and Protocols: Part 1
10.3837/tiis.2013.05.001
10.3837/tiis.2013.05.002
- Wireless medical sensor networks
- medical professional authentication
- medical sensor-node impersonation
- insecure session key
- password guessing.
10.3837/tiis.2013.05.003
10.3837/tiis.2013.05.004
10.3837/tiis.2013.05.005
- Wireless Body Area Networks
- disaster aid
- emergency response
- cloud data storage
- Wireless Sensor Networks
10.3837/tiis.2013.05.006
10.3837/tiis.2013.05.007
- control variables
- healthcare system
- Medical Incident Care
- WBAN Governance
- Mission Critical System
- Information Technology Supervisio
10.3837/tiis.2013.05.008
10.3837/tiis.2013.05.009
10.3837/tiis.2013.05.010
Internet & Communications
10.3837/tiis.2013.05.011
10.3837/tiis.2013.05.012
- Internet of Things
- mobile-aware service
- social relationships
- trusted chain
- mobile-aware service routing algorithm
10.3837/tiis.2013.05.013
- Wireless Sensor Networks
- Doppler effect
- environmental noises
- Tracking
- binary sensor
- noise mitigation.
10.3837/tiis.2013.05.014
10.3837/tiis.2013.05.015
10.3837/tiis.2013.05.016
Multimedia
10.3837/tiis.2013.05.017
10.3837/tiis.2013.05.018
- Image retrieval
- collaborative similarity metric learning
- structural SVM
- correlated label propagation
Internet Security
10.3837/tiis.2013.05.019
10.3837/tiis.2013.05.020
- Cloud computing
- Layered Security Architecture
- Security Protocol
- S-pi Calculus
- Identity-Based Cryptography.
10.3837/tiis.2013.05.021
10.3837/tiis.2013.05.022
10.3837/tiis.2013.05.023
Archives