Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain
暂无分享,去创建一个
Gautam Srivastava | Kim-Kwang Raymond Choo | Ali Dehghantanha | Abbas Yazdinejad | Mohammed Aledhari | Reza M Parizi | R. Parizi | A. Dehghantanha | Gautam Srivastava | K. Choo | Mohammed Aledhari | Abbas Yazdinejad
[1] Kim-Kwang Raymond Choo,et al. Blockchain in healthcare applications: Research challenges and opportunities , 2019, J. Netw. Comput. Appl..
[2] Gautam Srivastava,et al. A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.
[3] Hiroshi Yoshida,et al. Development of ASV for using multiple AUVs operation , 2018, OCEANS 2018 MTS/IEEE Charleston.
[4] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[5] Greg Irving,et al. How blockchain-timestamped protocols could improve the trustworthiness of medical science , 2016, F1000Research.
[6] Matthias Mettler,et al. Blockchain technology in healthcare: The revolution starts here , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).
[7] Frank Swiderski,et al. Threat Modeling , 2018, Hacking Connected Cars.
[8] Gautam Srivastava,et al. Data Sharing and Privacy for Patient IoT Devices Using Blockchain , 2019, iSCI.
[9] Adnan Rachmat Anom Besari,et al. Design and implementation of smart environment monitoring and analytics in real-time system framework based on internet of underwater things and big data , 2016, 2016 International Electronics Symposium (IES).
[10] Ali Dehghantanha,et al. Empirical Vulnerability Analysis of Automated Smart Contracts Security Testing on Blockchains , 2018, CASCON.
[11] Tooska Dargahi,et al. A systematic , 2022 .
[12] Teerawat Issariyakul,et al. Introduction to Network Simulator NS2 , 2008 .
[13] Caoyang Yu,et al. Adaptive Fuzzy Trajectory Tracking Control of an Under-Actuated Autonomous Underwater Vehicle Subject to Actuator Saturation , 2018, Int. J. Fuzzy Syst..
[14] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[15] Aviv Zohar,et al. PHANTOM: A Scalable BlockDAG Protocol , 2018, IACR Cryptol. ePrint Arch..
[16] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[17] Wei Wu,et al. NS-2 Simulation of VANET for Safety Applications: Issues and Solutions , 2017, ICCMS '17.
[18] Mohsen Guizani,et al. MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain , 2017, IEEE Access.
[19] Qi Chen,et al. Overhaul of ieee 802.11 modeling and simulation in ns-2 , 2007, MSWiM '07.
[20] Rui Guo,et al. Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems , 2018, IEEE Access.
[21] Fran Casino,et al. A systematic literature review of blockchain-based applications: Current status, classification and open issues , 2019, Telematics Informatics.
[22] F. Richard Yu,et al. A Survey of Blockchain Technology Applied to Smart Cities: Research Issues and Challenges , 2019, IEEE Communications Surveys & Tutorials.
[23] Ahmed Serhrouchni,et al. Bubbles of Trust: A decentralized blockchain-based authentication system for IoT , 2018, Comput. Secur..
[24] Ali Dehghantanha,et al. Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks , 2019, IEEE Transactions on Network Science and Engineering.
[25] Václav Matyás,et al. Toward Reliable User Authentication through Biometrics , 2003, IEEE Secur. Priv..
[26] Zibin Zheng,et al. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).
[27] Gautam Srivastava,et al. Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices , 2019, IEEE Access.