54110-R, MTM-2015-69138-REDT and DIG02-
INSITU.
REFERENCES
Ageev, A. A. and Sviridenko, M. I. (2000). An approxima-
tion algorithm for hypergraph max k-cut with given
sizes of parts. In Algorithms-ESA 2000, pages 32–41.
Springer.
Alizadeh, M., Abolfazli, S., Zamani, M., Baharun, S., and
Sakurai, K. (2016). Authentication in mobile cloud
computing: A survey. Journal of Network and Com-
puter Applications, 61:59–80.
Baracoda (2017). Idbluean efficient way to add rfid re-
ader/encoder to bluetooth pda and mobile phones.
Available online: http://www.baracoda.com (accessed
on 15 February 2017).
Bos, J. W., Halderman, J. A., Heninger, N., Moore, J., Na-
ehrig, M., and Wustrow, E. (2014). Elliptic curve
cryptography in practice. In International Conference
on Financial Cryptography and Data Security, pages
157–175. Springer.
Boyen, X. (2010). Identity-based signcryption. Springer.
de Berg, M., Cheong, O., van Kreveld, M., and Overmars,
M. (2008). Delaunay triangulations. Computational
Geometry: Algorithms and Applications, pages 191–
218.
de Sousa, V. J. R., Anjos, M. F., and Le Digabel, S. (2016).
Computational study of valid inequalities for the max-
imum k-cut problem.
Facebook (2017). Facebook safety check. Available on-
line: https://www.facebook.com/about/safetycheck/
(accessed on 15 February 2017).
Foundation, S. (2017). Open source disaster
management software. Available online:
https://sahanafoundation.org/ (accessed on 15
February 2017).
Gao, T., Massey, T., Selavo, L., Crawford, D., Chen, B.-
r., Lorincz, K., Shnayder, V., Hauenstein, L., Dabiri,
F., Jeng, J., et al. (2007). The advanced health and
disaster aid network: A light-weight wireless medical
system for triage. Biomedical Circuits and Systems,
IEEE Transactions on, 1(3):203–216.
Google (2017). Google person finder web page. Available
online: https://google.org/ (accessed on 15 February
2017).
Hespanha, J. P. (2004). An efficient matlab algorithm for
graph partitioning. Santa Barbara, CA, USA: Univer-
sity of California.
Hoffman, K. L., Padberg, M., and Rinaldi, G. (2013). Tra-
veling salesman problem. In Encyclopedia of opera-
tions research and management science, pages 1573–
1578. Springer.
Inoue, S., Sonoda, A., Oka, K., and Fujisaki, S. (2006).
Emergency healthcare support: Rfid-based massive
injured people management. In Proceedings of the
fourth International Workshop on Ubiquitous Com-
puting for Pervasive Healthcare Applications, Irvine,
CA.
Knox, R. W. (2015). Marcq saint-hilaire without tears. The
International Hydrographic Review, 52(2).
Lee, J.-S., Su, Y.-W., and Shen, C.-C. (2007). A compara-
tive study of wireless protocols: Bluetooth, uwb, zig-
bee, and wi-fi. In Industrial Electronics Society, 2007.
IECON 2007. 33rd Annual Conference of the IEEE,
pages 46–51. IEEE.
Malone-Lee, J. (2002). Identity-based signcryption. IACR
Cryptology ePrint Archive, 2002:98.
Mudaliar, D. N. and Modi, N. K. (2013). Unraveling travel-
ling salesman problem by genetic algorithm using m-
crossover operator. In Signal Processing Image Pro-
cessing & Pattern Recognition (ICSIPR), 2013 Inter-
national Conference on, pages 127–130. IEEE.
Neuenschwander, M., Cohen, M. R., Vaida, A. J., Pat-
chett, J. A., Kelly, J., and Trohimovich, B. (2003).
Practical guide to bar coding for patient medication
safety. AMERICAN JOURNAL OF HEALTH SYSTEM
PHARMACY, 60(8):768–779.
of Medicine at NIH, N. L. (2017). People loca-
tor and reunite web page. Available online:
https://lpf.nlm.nih.gov/ (accessed on 15 February
2017).
Rivero-Garcıa, A., Hern
´
andez-Goya, C., Santos-Gonz
´
alez,
I., and Caballero-Gil, P. (2014). Fasttriaje: A mobile
system for victim classification in emergency situati-
ons.
Santos-Gonz
´
alez, I., Rivero-Garc
´
ıa, A., Caballero-Gil, P.,
and Hern
´
andez-Goya, C. (2014). Alternative commu-
nication system for emergency situations. In WEBIST
(2), pages 397–402.
Sesia, S., Toufik, I., and Baker, M. (2009). LTE: the UMTS
long term evolution. Wiley Online Library.
Smart, N. P. (2016). Hash functions, message authentication
codes and key derivation functions. In Cryptography
Made Simple, pages 271–294. Springer.
Want, R. (2011a). Near field communication. IEEE Perva-
sive Computing, (3):4–7.
Want, R. (2011b). Near field communication. IEEE Perva-
sive Computing, (3):4–7.
Zou, Z., Chen, Q., Uysal, I., and Zheng, L. (2014). Ra-
dio frequency identification enabled wireless sensing
for intelligent food logistics. Phil. Trans. R. Soc. A,
372(2017):20130313.
IBSC System for Victims Management in Emergency Scenarios
283