1 |
Robert L Grossman, Harinath Sivakumar and S. Bailey,PSockets: The case for application-level network striping for data intensive applications using high speed wide area networks, Supercomputing, IEEE and ACM, 2000.
|
2 |
T. Durnigan, Parallel TCP, August 2002.http://www.csm.ornl.gov/-dunigan/netperf/parallel.html
|
3 |
International Organization for Standardization, "ISO/IEC 18000-3, Information Technology AIDC Technique -RFID for Item Management," March 2003.
|
4 |
Stephen A. Weis, Sanjay E.Sarma, Ronald L. Rivest and Daiel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", First International Conference on Security in Pervasive Computing, 2003.
|
5 |
Martin Feldhofer, "A proposal for Authentication Protocol in Secutity Layer for RFID Smart Tags," IEEE Proceedings of MELECON 2004, Vol. 2, pp. 759-762, 2004.
|
6 |
Santosh Mahapatra and Xin Yuan,"Load Balancing Mechanism in data Center Networks," IEEE CEWIT 2010.
|
7 |
Mohammad Al-Fares Alexander Loukissas, Amin Vahdat."A Scalable, Commodity Data Center Network Architecture," proceedings of SIGCOMM 2008.
|
8 |
Joan Daemen, Vincent Rijmen, "AES Proposal: Rijndael ", (http://csrc.nist.gov/encryption/aes/rijndael/Rijindael.pdf)
|
9 |
M.jakobsson and D. Pointcheval, "Mutual Authentication for Low-power Mobile Devices," Lecture Notes in Computer Science, pp. 178-196, 2002.
|
10 |
J.Zhou, Z.Cao, X.L.Dong, X.D.Lin, "Securingmhealthcare social networks:challenges, Communications, Vol.20, No.4, pp.12-21, 2013.
|
11 |
U.Harish, R. Ganesan, "Design and development of secured m-healthcare system", International conference on Advances in Engineering, Science and Management(ICAESM), pp.470-473, 2012.
|
12 |
www.ushmmorg/research/doctors/Nuremberg_Code.htm
|
13 |
Curphey, Araujo. Web Application Security Assessment Tools, IEEE Security and Privacy archive, Volume 4 Issue 4, pp.32-41, 2006.
DOI
ScienceOn
|
14 |
B.Chess, G. McGraw. Static Analysis for Security, IEEE Security & Privacy, pp.79-84, 2004.
|
15 |
Mariantonietta La Pilla, Fabio Martinelli, and Daniele Sgandurra. A Survey on Security for Mible Device, IEEE communication Surveys and Tutorials, Vol. PP,Issue 99, pp.1-26, 2012
|
16 |
L.Rizzo, "Effective Erasure Codes for Reliable Computer Communication Protocols,"ACM Comp. Comm, Review, vol.27 no2, pp.24-36, April 1997.
DOI
|
17 |
P.Ferre, D.Agrafiots, T.K. Chiew, A.R.Nix, and D.R. Bull,"Multimedia Transmission over IEEE 802.1 1g WLANS: Practical Issues and Consideration," ICCE 2007, pp.1-2, Las Vegas. Jan. 2007.
|