Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks
暂无分享,去创建一个
[1] Anurag Tewari,et al. Security and Privacy in E-Healthcare Monitoring with WBAN: A Critical Review , 2016 .
[2] Benjamin Fabian,et al. Collaborative and secure sharing of healthcare data in multi-clouds , 2015, Inf. Syst..
[3] Jin Wang,et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .
[4] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[5] Gil Eduardo de Andrade,et al. Message routing in vehicular delay-tolerant networks based on human behavior , 2016, 2016 10th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP).
[6] Zhixin Sun,et al. A Symmetric Lookup-based Secure P2P Routing Algorithm , 2016, KSII Trans. Internet Inf. Syst..
[7] Xiangyun Zhou,et al. Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.
[8] Boleslaw K. Szymanski,et al. Trust Based Secure Routing in Delay Tolerant Networks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[9] Ram Shringar Raw,et al. Distance and direction-based location aided multi-hop routing protocol for vehicular ad-hoc networks , 2016, Int. J. Commun. Networks Distributed Syst..
[10] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[11] Ren-Song Ko,et al. Geographical model-derived grid-based directional routing for massively dense WSNs , 2016, EURASIP J. Wirel. Commun. Netw..
[12] Min Chen,et al. Software-Defined Mobile Networks Security , 2016, Mobile Networks and Applications.
[13] Garth V. Crosby,et al. Wireless Body Area Networks for Healthcare: A Survey , 2012 .
[14] Rajkumar Buyya,et al. An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing , 2016, J. Netw. Comput. Appl..
[15] Xiaolei Dong,et al. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..
[16] Samira Moussaoui,et al. Direction-based Greedy Forwarding in Mobile Wireless Sensor Networks , 2012, ICT 2012.
[17] J. K. Mandal,et al. DirMove: direction of movement based routing in DTN architecture for post-disaster scenario , 2016, Wirel. Networks.
[18] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[19] Victor C. M. Leung,et al. CAP: community activity prediction based on big data analysis , 2014, IEEE Network.
[20] Christian Wietfeld,et al. PASER: Secure and Efficient Routing Approach for Airborne Mesh Networks , 2016, IEEE Transactions on Wireless Communications.
[21] Jaime Lloret Mauri,et al. Improved Geographical Routing in Vehicular Ad Hoc Networks , 2015, Wirel. Pers. Commun..
[22] Jian Shen,et al. Buffer scheme optimization of epidemic routing in delay tolerant networks , 2014, Journal of Communications and Networks.
[23] E. Jagadeeswararao,et al. Performance Analysis of MANET Routing Protocols - DSDV, DSR, AODV, AOMDV Using Ns-2 , 2015 .
[24] Yue Cao,et al. A Survey on Geographic Routing Protocols in Delay/Disruption Tolerant Networks , 2016, Int. J. Distributed Sens. Networks.
[25] Jian Shen,et al. A Priority Routing Protocol Based on Location and Moving Direction in Delay Tolerant Networks , 2010, IEICE Trans. Inf. Syst..
[26] Min Chen,et al. Wearable 2.0: Enabling Human-Cloud Integration in Next Generation Healthcare Systems , 2017, IEEE Communications Magazine.
[27] Albert Levi,et al. An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer , 2013, LightSec.
[28] Jian Shen,et al. Organized topology based routing protocol in incompletely predictable ad-hoc networks , 2017, Comput. Commun..
[29] Jian Shen,et al. Identity-based key agreement protocol employing a symmetric balanced incomplete block design , 2012, Journal of Communications and Networks.
[30] Xiaofeng Liao,et al. Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme , 2013, IEEE Journal on Selected Areas in Communications.
[31] Min Chen,et al. Smart Clothing: Connecting Human with Clouds and Big Data for Sustainable Health Monitoring , 2016, Mobile Networks and Applications.
[32] Xingming Sun,et al. Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement , 2016, IEEE Transactions on Parallel and Distributed Systems.
[33] Jian Shen,et al. Enhanced secure sensor association and key management in wireless body area networks , 2015, Journal of Communications and Networks.
[34] Kamalrulnizam Abu Bakar,et al. A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network , 2016, Mob. Networks Appl..
[35] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[36] Benxiong Huang,et al. Scheduled-links multicast routing protocol in MANETs , 2016, J. Netw. Comput. Appl..
[37] Min Chen,et al. AIWAC: affective interaction through wearable computing and cloud technology , 2015, IEEE Wireless Communications.
[38] Jian Shen,et al. A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .
[39] Xin Wang,et al. Secure Routing Based on Social Similarity in Opportunistic Networks , 2016, IEEE Transactions on Wireless Communications.
[40] Robert Simon Sherratt,et al. A Survey on Wireless Body Area Networks for eHealthcare Systems in Residential Environments , 2016, Sensors.
[41] Hitendra D. Patil,et al. Delay Efficient Authenticated Anonymous Secure Routing for MANETs , 2016 .
[42] Tinghuai Ma,et al. Social Network and Tag Sources Based Augmenting Collaborative Recommender System , 2015, IEICE Trans. Inf. Syst..