IoT Use Cases and Implementations

[1]  Djamel Tandjaoui,et al.  A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.

[2]  Nai-Wei Lo,et al.  A Lightweight Continuous Authentication Protocol for the Internet of Things , 2018, Sensors.

[3]  Abderrahim Marzouk,et al.  A Secure IoT Data Integration in Cloud Storage Systems using ABAC Access Control Policy , 2017 .

[4]  G. Hankey,et al.  The global and regional burden of stroke. , 2013, The Lancet. Global health.

[5]  Walid Saad,et al.  Authentication of Everything in the Internet of Things: Learning and Environmental Effects , 2018, ArXiv.

[6]  Vladimir Vujovic,et al.  Internet of Things Based E-health Systems: Ideas, Expectations and Concerns , 2017, Handbook of Large-Scale Distributed Computing in Smart Healthcare.

[7]  Ítalo S. Cunha,et al.  AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle , 2016, SenSys.

[8]  Susanna Spinsante,et al.  Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[9]  Amir Manzoor Securing Device Connectivity in the Industrial Internet of Things (IoT) , 2016 .

[10]  Zhiyuan Tan,et al.  Security for Cyber-Physical Systems in Healthcare , 2017 .

[11]  Subbarayan Venkatesan,et al.  Authentication of IoT Device and IoT Server Using Secure Vaults , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).