Author image not provided
 Ghada Almashaqbeh

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article5.20
Citation Count26
Publication count5
Publication years2014-2017
Available for download2
Average downloads per article28.00
Downloads (cumulative)56
Downloads (12 Months)35
Downloads (6 Weeks)26
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author




BOOKMARK & SHARE


5 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 5 of 5
Sort by:

1 published by ACM
December 2017 ACM Transactions on Privacy and Security (TOPS): Volume 21 Issue 2, January 2018
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 22,   Downloads (12 Months): 22,   Downloads (Overall): 22

Full text available: PDFPDF
Recent compilers allow a general-purpose program (written in a conventional programming language) that handles private data to be translated into a secure distributed implementation of the corresponding functionality. The resulting program is then guaranteed to provably protect private data using secure multi-party computation techniques. The goals of such compilers are ...
Keywords: oblivious data structures, pointers to private data, secret sharing, Secure multi-party computation, dynamic memory management, C compiler

2
October 2015 Mobile Networks and Applications: Volume 20 Issue 5, October 2015
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

IEEE 802.11 is one of the most well-established and widely used standard for wireless LAN. Its Medium Access control (MAC) layer assumes that the devices adhere to the standard's rules and timers to assure fair access and sharing of the medium. However, wireless cards driver flexibility and configurability make it ...
Keywords: Selfish detection, MAC misbehaving, 802.11 security, Backoff time, Green solution

3
November 2014 Wireless Networks: Volume 20 Issue 8, November 2014
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 17

Wireless Body Area Network (WBAN) is the most convenient, cost-effective, accurate, and non-invasive technology for e-health monitoring. The performance of WBAN may be disturbed when coexisting with other wireless networks. Accordingly, this paper provides a comprehensive study and in-depth analysis of coexistence issues and interference mitigation solutions in WBAN technologies. ...
Keywords: Coexistence, E-health, IEEE 802.15.4, Interference, Low-power WiFi, WBAN, IEEE 802.15.6

4
October 2014 Journal of Medical Systems: Volume 38 Issue 10, October 2014
Publisher: Plenum Press
Bibliometrics:
Citation Count: 5

Wireless Body Area Networks (WBANs) are amongst the best options for remote health monitoring. However, as standalone systems WBANs have many limitations due to the large amount of processed data, mobility of monitored users, and the network coverage area. Integrating WBANs with cloud computing provides effective solutions to these problems ...
Keywords: Cloud computing, Medical sensors, Body area networks, E-Health, Multi-radio

5
September 2014 BodyNets '14: Proceedings of the 9th International Conference on Body Area Networks
Publisher: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 8,   Downloads (Overall): 23

Full text available: PDFPDF
Merging WBAN systems with cloud computing is an efficient solution to overcome limitations inherent in WBAN, especially in critical human-related applications such as remote health monitoring. In cloud-based WBAN, the nodes are classified into WBAN sensors that report measurements about the human body and WBAN actuators that receive commands from ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us