Learn More
Although conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, these techniques do not directly leverage the unique properties of the wireless domain to address security threats. The properties of the wireless medium are a powerful source of domain-specific information that can complement and(More)
The Montgomery-Asberg Depression Scale was evaluated in 44 depressed inpatients. All items of the scale occurred frequently in the sample; the scale exhibited construct validity (internal homogeneity) and concurrent validity relative to the Hamilton Depression Scale and the concepts of endogenous and nonendogenous depression. Sleep disturbance, reduced(More)
Forming secure associations between wireless devices that do not share a prior trust relationship is an important problem. This paper presents ProxiMate, a system that allows wireless devices in proximity to securely pair with one another autonomously by generating a common cryptographic key directly from their shared time-varying wireless environment. The(More)
Tire Pressure Monitoring Systems represent, to the best of our knowledge, the first in-car wireless network mandated for every new automobile. The security and privacy implications of such in-car wireless sensor networks are not fully understood— in particular, it is unclear whether the metal car body sufficiently shields these low-power transceivers from(More)
Research on smart meters has shown that fine-grained energy usage data poses privacy risks since it allows inferences about activities inside the home. While smart meter deployments are very limited, more than 40 million meters in the United States have been equipped with Automatic Meter Reading (AMR) technology over the past decades. AMR utilizes wireless(More)
Current national standards and/or guidelines for correctional mental health care programs emphasize the importance of various levels of mental health screening and evaluation that should be performed by qualified personnel on all inmates as part of the admission process to a prison. The authors describe the results of a study that included data from all 50(More)
In their recent Analysis and Commentary article Bursztajn and colleagues argue persuasively that to provide comprehensive independent medical evaluations (IMEs), forensic psychiatrists must take into account the managed care context of a claimant's case. The author of this article agrees with that assessment, but adds that another significant problem in his(More)