2006 Digest of Technical Papers International Conference on Consumer Electronics
DOI: 10.1109/icce.2006.1598399
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Security Control Architecture for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…We define α as the frequency value that limits the search range, and ) ( − t δ as the value at previous time − t [1]. We give 0.5Hz toα , and it is same with filtering by 0.5-1.5Hz band pass.…”
Section: Hif Extraction Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We define α as the frequency value that limits the search range, and ) ( − t δ as the value at previous time − t [1]. We give 0.5Hz toα , and it is same with filtering by 0.5-1.5Hz band pass.…”
Section: Hif Extraction Methodsmentioning
confidence: 99%
“…It connects anyone who use this service to server which administer the users, also can always check own condition. Electronic healthcare systems which have ubiquitous concept can enable medical professionals to remotely make real-time monitoring, early diagnosis, and treatment for potential risky disease, and provide the medical diagnose and consulting results to the patient via wired/wireless communication channels [1]. The most important features of these devices are unconscious and noinvasive instrumentation method.…”
Section: Introductionmentioning
confidence: 99%
“…To improve polarization matching, the PIFA was oriented so that its polarization vector was always parallel to that of the tags in all the experiments. During the measurements, the volunteer took twenty different "static" (1)(2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14) and "moving" (15-16) pos tures, illustrated in Figure 9. The last four positions corre sponded to the subject lying on the ground and could be repre sentative of particularly dangerous situations, such as fainting or accidents.…”
Section: On-body Communicationsmentioning
confidence: 99%
“…Pioneering applications are currently being experimented with in sensor networks, personal healthcare, and even entertainment and social arts [1][2][3][4][5][6]. In these battery-less (say, passive) systems, the RF power required by the transponder element (the tag) to respond to the query device (the reader) is scavenged from the interrogation signal by the tag itself.…”
Section: Introductionmentioning
confidence: 99%
“…In [6], [7], and [8], PKI (Public Key Infrastructure) based security solutions are proposed for healthcare. [6] emphasizes on multi-layered security infrastructure that copes with the strong user authentication procedures based on smart cards, digital certificates, and PKI systems.…”
Section: Related Workmentioning
confidence: 99%