Enhancing Security of Health Information Using Modular Encryption Standard in Mobile Cloud Computing
暂无分享,去创建一个
Jerry Chun-Wei Lin | Maryam Shabbir | Celestine Iwendi | Norbert Herencsar | Abdul Rehman Javed | Ayesha Shabbir | Muhammad Rizwan | A. R. Javed | C. Iwendi | N. Herencsar | M. Rizwan | Ayesha Shabbir | Maryam Shabbir | Jerry Chun‐wei Lin
[1] Aysha K. Alharam,et al. The Effects of Cyber-Security on Healthcare Industry , 2017, 2017 9th IEEE-GCC Conference and Exhibition (GCCCE).
[2] Harshita Patel,et al. A review on classification of imbalanced data for wireless sensor networks , 2020, Int. J. Distributed Sens. Networks.
[3] Ali Daud,et al. Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure , 2018, Wirel. Commun. Mob. Comput..
[4] Houbing Song,et al. Mobile Cloud Computing Model and Big Data Analysis for Healthcare Applications , 2016, IEEE Access.
[5] Ondrej Krejcar,et al. Framework of Design Requirements for E-learning Applied on Blackboard Learning System , 2015, ICCCI.
[6] Thar Baker,et al. A collaborative healthcare framework for shared healthcare plan with ambient intelligence , 2020, Hum. centric Comput. Inf. Sci..
[7] Beakcheol Jang,et al. Privacy Provision in Collaborative Ehealth With Attribute-Based Encryption: Survey, Challenges and Future Directions , 2019, IEEE Access.
[8] Hua Wang,et al. Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing , 2019, IEEE Access.
[9] Scholas Mbonihankuye,et al. Healthcare Data Security Technology: HIPAA Compliance , 2019, Wirel. Commun. Mob. Comput..
[10] Zhanpeng Jin,et al. An Overview of Mobile Cloud Computing for Pervasive Healthcare , 2019, IEEE Access.
[11] Rengarajan Amirtharajan,et al. Networked medical data sharing on secure medium - A web publishing mode for DICOM viewer with three layer authentication , 2018, J. Biomed. Informatics.
[12] Natarajan Deepa,et al. A Survey on Blockchain for Big Data: Approaches, Opportunities, and Future Directions , 2020, ArXiv.
[13] Unil Yun,et al. ASRNN: A recurrent neural network with an attention model for sequence labeling , 2020, Knowl. Based Syst..
[14] Ali Kashif Bashir,et al. PARCIV: Recognizing physical activities having complex interclass variations using semantic data of smartphone , 2020, Softw. Pract. Exp..
[15] Hans-Ulrich Prokosch,et al. A scoping review of cloud computing in healthcare , 2015, BMC Medical Informatics and Decision Making.
[16] Ali Al-Haj,et al. Digital image security based on data hiding and cryptography , 2017, 2017 3rd International Conference on Information Management (ICIM).
[17] Yan Luo,et al. A Review of Secure and Privacy-Preserving Medical Data Sharing , 2019, IEEE Access.
[18] Wang Yong,et al. Socio-Technological Factors Affecting User’s Adoption of eHealth Functionalities: A Case Study of China and Ukraine eHealth Systems , 2019, IEEE Access.
[19] Marcelo Antonio de Carvalho Junior,et al. Health Information System Role-Based Access Control Current Security Trends and Challenges , 2018, Journal of healthcare engineering.
[20] Muzhir Shaban Al-Ani,et al. Mobile Cloud Computing Applied to Healthcare Approach , 2016 .
[21] Lei Shu,et al. EdgeCare: Leveraging Edge Computing for Collaborative Data Management in Mobile Healthcare Systems , 2019, IEEE Access.
[22] Han Qi,et al. Research on mobile cloud computing: Review, trend and perspectives , 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP).
[23] Nureni Ayofe Azeez,et al. Security and privacy issues in e-health cloud-based system: A comprehensive content analysis , 2019, Egyptian Informatics Journal.
[24] Celestine Iwendi,et al. An Efficient and Unique TF/IDF Algorithmic Model-Based Data Analysis for Handling Applications with Big Data Streaming , 2019, Electronics.
[25] Dan Liu,et al. A Survey on Secure Data Analytics in Edge Computing , 2019, IEEE Internet of Things Journal.
[26] Gautam Srivastava,et al. Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments , 2021, IEEE Internet of Things Journal.
[27] Celestine Iwendi,et al. Analyzing the Effectiveness and Contribution of Each Axis of Tri-Axial Accelerometer Sensor for Accurate Activity Recognition , 2020, Sensors.
[28] József Ködmön,et al. Információbiztonság az egészségügyben , 2015 .
[29] Praveen Kumar Reddy Maddikunta,et al. A metaheuristic optimization approach for energy efficiency in the IoT networks , 2020, Softw. Pract. Exp..
[30] Ahmed Tamrawi,et al. eHealth Cloud Security Challenges: A Survey , 2019, Journal of healthcare engineering.
[31] Mukesh Singhal,et al. A dynamic cloud computing platform for eHealth systems , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).
[32] José Luis Fernández Alemán,et al. Security and privacy in electronic health records: A systematic literature review , 2013, J. Biomed. Informatics.
[33] Abdullah Algarni,et al. A Survey and Classification of Security and Privacy Research in Smart Healthcare Systems , 2019, IEEE Access.
[34] Mritunjay Kumar Rai,et al. Privacy Ensured ${e}$ -Healthcare for Fog-Enhanced IoT Based Applications , 2019, IEEE Access.
[35] Guang-Zhong Yang,et al. A Method of Signal Scrambling to Secure Data Storage for Healthcare Applications , 2017, IEEE Journal of Biomedical and Health Informatics.
[36] Abdul Rehman Javed,et al. Collaborative Health Care Plan through Crowdsource Data using Ambient Application , 2019, 2019 22nd International Multitopic Conference (INMIC).
[37] L. Arockiam,et al. Hybrid security techniques to protect sensitive data in E-healthcare systems , 2018, 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT).
[38] Xabier Larrucea,et al. Assessing source code vulnerabilities in a cloud-based system for health systems: OpenNCP , 2019, IET Softw..
[39] K R Venugopal,et al. SIRLC: Secure Information Retrieval using Lightweight Cryptography in HIoT , 2019, TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON).
[40] Robert H. Deng,et al. Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control , 2018, IEEE Internet of Things Journal.
[41] Andrés Marín López,et al. Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management , 2017, IEEE Journal of Biomedical and Health Informatics.
[42] Michel Dagenais,et al. System Health Monitoring Using a Novel Method: Security Unified Process , 2012, J. Comput. Networks Commun..
[43] William A. Yasnoff,et al. A secure and efficiently searchable health information architecture , 2016, J. Biomed. Informatics.
[44] Tony R. Sahama,et al. eHealth-as-a-Service (eHaaS): The industrialisation of health informatics, a practical approach , 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom).
[45] Shihab A. Hameed,et al. Mobile Cloud Computing For Emergency Healthcare Model:Framework , 2018, 2018 7th International Conference on Computer and Communication Engineering (ICCCE).
[46] Yixian Yang,et al. Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing , 2018, IEEE Access.
[47] Rui Guo,et al. Flexible and Efficient Blockchain-Based ABE Scheme With Multi-Authority for Medical on Demand in Telemedicine System , 2019, IEEE Access.
[48] Ibrahim Khalil,et al. Protection of electronic health records (EHRs) in cloud , 2013, 2013 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).