Search
for Author
All Reviews
Kotz, David
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
5
of
8
reviews
Security for mobile and cloud frontiers in healthcare
Kotz D., Fu K., Gunter C., Rubin A. Communications of the ACM 58(8): 21-23, 2015. Type: Article
Healthcare organizations need secure clinical information systems to provide better quality medical services, increase access to medical records, and reduce the operative costs of business. What technologies do healthcare providers nee...
...
Dec 1 2015
Privacy in mobile technology for personal healthcare
Avancha S., Baxi A., Kotz D. ACM Computing Surveys 45(1): 1-54, 2012. Type: Article
When you are sick, everyone wants your data. Advances in mobile computing are helping to create systems that gather detailed data from patients in real-life settings, and convey it to clinicians for individualized care. This trove of d...
...
Feb 25 2013
A privacy framework for mobile health and home-care systems
Kotz D., Avancha S., Baxi A. SPIMACS 2009 (Proceedings of the 1st ACM Workshop on Security and Privacy in Medical and Home-care Systems, Chicago, IL, Nov 13, 2009) 1-12, 2009. Type: Proceedings
Health systems enabled by new information and communications technologies are discussed in this paper. The emergence of mobile communication systems, health information processing systems, and e-health portfolios with embedded tele-med...
...
Jul 19 2010
The changing usage of a mature campus-wide wireless network
Henderson T., Kotz D., Abyzov I. Computer Networks 52(14): 2690-2712, 2008. Type: Article
Nearly a decade since the technology’s debut, 802.11-based wireless local area networks (WLANs) have become an indispensable type of infrastructure, upon which mobile computer and handheld device users increasingly rely. In o...
...
Feb 5 2009
Active behavioral fingerprinting of wireless devices
Bratus S., Cornelius C., Kotz D., Peebles D. Wireless network security (Proceedings of the First ACM Conference on Wireless Network Security, Alexandria, VA, 56-61, 2008. Type: Proceedings
Fingerprinting for wireless devices, especially for those using 802.11 series standards, has a wide variety of targets and approaches. Is there any approach that exploits the stimulus-response nature of devices such that fingerprinting...
...
Jul 18 2008
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy