Security Defenses for Vulnerable Medical Sensor Network. Yan, R., Shah, V. C., Xu, T., & Potkonjak, M. In ICHI, pages 300-309, 2014. IEEE Computer Society.
Link
Paper bibtex @inproceedings{conf/ichi/YanSXP14,
added-at = {2015-10-17T00:00:00.000+0200},
author = {Yan, Renchi and Shah, Vaibhav Chetan and Xu, Teng and Potkonjak, Miodrag},
biburl = {https://www.bibsonomy.org/bibtex/2350ed5d0def4ab2a24f80aa494135b3a/dblp},
booktitle = {ICHI},
crossref = {conf/ichi/2014},
ee = {http://dx.doi.org/10.1109/ICHI.2014.48},
interhash = {35df1e931b469713d5798ceece5782f6},
intrahash = {350ed5d0def4ab2a24f80aa494135b3a},
isbn = {978-1-4799-5701-9},
keywords = {dblp},
pages = {300-309},
publisher = {IEEE Computer Society},
timestamp = {2015-12-18T11:35:35.000+0100},
title = {Security Defenses for Vulnerable Medical Sensor Network.},
url = {http://dblp.uni-trier.de/db/conf/ichi/ichi2014.html#YanSXP14},
year = 2014
}
Downloads: 0
{"_id":"z6ouiu5wm6rTXohRi","bibbaseid":"yan-shah-xu-potkonjak-securitydefensesforvulnerablemedicalsensornetwork-2014","author_short":["Yan, R.","Shah, V. C.","Xu, T.","Potkonjak, M."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2015-10-17T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Yan"],"firstnames":["Renchi"],"suffixes":[]},{"propositions":[],"lastnames":["Shah"],"firstnames":["Vaibhav","Chetan"],"suffixes":[]},{"propositions":[],"lastnames":["Xu"],"firstnames":["Teng"],"suffixes":[]},{"propositions":[],"lastnames":["Potkonjak"],"firstnames":["Miodrag"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2350ed5d0def4ab2a24f80aa494135b3a/dblp","booktitle":"ICHI","crossref":"conf/ichi/2014","ee":"http://dx.doi.org/10.1109/ICHI.2014.48","interhash":"35df1e931b469713d5798ceece5782f6","intrahash":"350ed5d0def4ab2a24f80aa494135b3a","isbn":"978-1-4799-5701-9","keywords":"dblp","pages":"300-309","publisher":"IEEE Computer Society","timestamp":"2015-12-18T11:35:35.000+0100","title":"Security Defenses for Vulnerable Medical Sensor Network.","url":"http://dblp.uni-trier.de/db/conf/ichi/ichi2014.html#YanSXP14","year":"2014","bibtex":"@inproceedings{conf/ichi/YanSXP14,\n added-at = {2015-10-17T00:00:00.000+0200},\n author = {Yan, Renchi and Shah, Vaibhav Chetan and Xu, Teng and Potkonjak, Miodrag},\n biburl = {https://www.bibsonomy.org/bibtex/2350ed5d0def4ab2a24f80aa494135b3a/dblp},\n booktitle = {ICHI},\n crossref = {conf/ichi/2014},\n ee = {http://dx.doi.org/10.1109/ICHI.2014.48},\n interhash = {35df1e931b469713d5798ceece5782f6},\n intrahash = {350ed5d0def4ab2a24f80aa494135b3a},\n isbn = {978-1-4799-5701-9},\n keywords = {dblp},\n pages = {300-309},\n publisher = {IEEE Computer Society},\n timestamp = {2015-12-18T11:35:35.000+0100},\n title = {Security Defenses for Vulnerable Medical Sensor Network.},\n url = {http://dblp.uni-trier.de/db/conf/ichi/ichi2014.html#YanSXP14},\n year = 2014\n}\n\n","author_short":["Yan, R.","Shah, V. C.","Xu, T.","Potkonjak, M."],"key":"conf/ichi/YanSXP14","id":"conf/ichi/YanSXP14","bibbaseid":"yan-shah-xu-potkonjak-securitydefensesforvulnerablemedicalsensornetwork-2014","role":"author","urls":{"Link":"http://dx.doi.org/10.1109/ICHI.2014.48","Paper":"http://dblp.uni-trier.de/db/conf/ichi/ichi2014.html#YanSXP14"},"keyword":["dblp"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/Chetan?items=1000","dataSources":["4GrFQfJ5X4gnR5SfR"],"keywords":["dblp"],"search_terms":["security","defenses","vulnerable","medical","sensor","network","yan","shah","xu","potkonjak"],"title":"Security Defenses for Vulnerable Medical Sensor Network.","year":2014}