The tidal waves of connected health devices with healthcare applications: consequences on privacy and care management in European healthcare systems
暂无分享,去创建一个
Catherine Quantin | François-André Allaert | Louis Legrand | Noël-Jean Mazen | Louis Legrand | F. Allaert | C. Quantin | Noël-Jean Mazen
[1] R. Glasgow,et al. Evaluating the public health impact of health promotion interventions: the RE-AIM framework. , 1999, American journal of public health.
[2] S. Ziebland,et al. How the internet affects patients' experience of cancer: a qualitative study , 2004, BMJ : British Medical Journal.
[3] A. Sheikh,et al. Telemonitoring based service redesign for the management of uncontrolled hypertension: multicentre randomised controlled trial , 2013, BMJ.
[4] I. Olkin,et al. Using pedometers to increase physical activity and improve health: a systematic review. , 2007, JAMA.
[5] P. Hustinx. Privacy by design: delivering the promises , 2010 .
[6] D. Turok,et al. Pills on the World Wide Web: reducing barriers through technology. , 2015, American journal of obstetrics and gynecology.
[7] Anazida Zainal,et al. Advancements of Data Anomaly Detection Research in Wireless Sensor Networks: A Survey and Open Issues , 2013, Sensors.
[8] Panagiotis D. Bamidis,et al. Internet of Things For an Age-Friendly Healthcare , 2015, MIE.
[9] Roman Hovorka,et al. Home Use of an Artificial Beta Cell in Type 1 Diabetes. , 2015, The New England journal of medicine.
[10] Darryl Booth. Internet of things builds capacity for automatic temperature logging. , 2015, Journal of environmental health.
[11] Gaetano Marrocco,et al. RFID Technology for IoT-Based Personal Healthcare in Smart Spaces , 2014, IEEE Internet of Things Journal.
[12] Mark Ryan,et al. Coercion-resistance and receipt-freeness in electronic voting , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[13] Sanggon Lee,et al. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things , 2014, Sensors.
[14] Lei Jiang,et al. A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance , 2013, Int. J. Netw. Secur..
[15] Deokho Kim,et al. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things , 2014, Sensors.
[16] Claudio Cobelli,et al. 2 month evening and night closed-loop glucose control in patients with type 1 diabetes under free-living conditions: a randomised crossover trial. , 2015, The lancet. Diabetes & endocrinology.