Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security ...
This paper discusses IT- and information security challenges for wearable computing encountered duri...
An intelligent wheelchair application is required which is equipped with the MEMSs which are magneto...
© 1998-2012 IEEE. As smartphone penetration saturates, we are witnessing a new trend in personal mob...
Miniaturization of computer hardware and the demand for network capable devices has resulted in the ...
Convergence of technologies from several domains of computing and healthcare have aided in the creat...
Convergence of technologies from several domains of computing and healthcare have aided in the creat...
Security schemes are rendered impractical if their cryptographic keys are compromised. ICMetric tech...
Wearable devices are an important part of internet of things (IoT)with many applications in healthca...
Wearable Technology also called wearable gadget, is acategory of technology devices with low process...
The Internet of Things (IoT) employs smart devices as its building blocks for developing a ubiquitou...
This paper presents a novel technique, termed ICmetrics (Integrated Circuit metrics), that can be us...
The paper presents a novel cryptographic authentication scheme that makes use of the presence of ele...
This paper discusses IT- and information security challenges for wearable computing encountered duri...
This paper discusses IT- and information security challenges for wearable computing encountered duri...
Health data are being increasingly sensed from the health-based wearable Internet of Things (IoT) de...
This paper discusses IT- and information security challenges for wearable computing encountered duri...
An intelligent wheelchair application is required which is equipped with the MEMSs which are magneto...
© 1998-2012 IEEE. As smartphone penetration saturates, we are witnessing a new trend in personal mob...
Miniaturization of computer hardware and the demand for network capable devices has resulted in the ...
Convergence of technologies from several domains of computing and healthcare have aided in the creat...
Convergence of technologies from several domains of computing and healthcare have aided in the creat...
Security schemes are rendered impractical if their cryptographic keys are compromised. ICMetric tech...
Wearable devices are an important part of internet of things (IoT)with many applications in healthca...
Wearable Technology also called wearable gadget, is acategory of technology devices with low process...
The Internet of Things (IoT) employs smart devices as its building blocks for developing a ubiquitou...
This paper presents a novel technique, termed ICmetrics (Integrated Circuit metrics), that can be us...
The paper presents a novel cryptographic authentication scheme that makes use of the presence of ele...
This paper discusses IT- and information security challenges for wearable computing encountered duri...
This paper discusses IT- and information security challenges for wearable computing encountered duri...
Health data are being increasingly sensed from the health-based wearable Internet of Things (IoT) de...
This paper discusses IT- and information security challenges for wearable computing encountered duri...
An intelligent wheelchair application is required which is equipped with the MEMSs which are magneto...
© 1998-2012 IEEE. As smartphone penetration saturates, we are witnessing a new trend in personal mob...