暂无分享,去创建一个
Abeer Alsadoon | Tarik A. Rashid | Oday D. Jerew | P.W.C. Prasad | Rasha S. Ali | Ravi Teja Batchu | Ghossoon Alsadoon | A. Alsadoon | P. Prasad | Tarik A. Rashid | R. Ali | Ghossoon Alsadoon
[1] Kim-Kwang Raymond Choo,et al. A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.
[2] Athanasios V. Vasilakos,et al. An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks , 2017, Comput. Electr. Eng..
[3] Wang Zhi-she,et al. Multi-sensor image enhanced fusion algorithm based on NSST and top-hat transformation , 2015 .
[4] Mohammed Abdullahi,et al. An Efficient Next Hop Selection Algorithm for Multi-Hop Body Area Networks , 2016, PloS one.
[5] Yonghong Chen,et al. Energy-efficient relay tracking with multiple mobile camera sensors , 2018, Comput. Networks.
[6] Oluwarotimi Williams Samuel,et al. Fuzzy vault-based biometric security method for tele-health monitoring systems , 2018, Comput. Electr. Eng..
[7] Lu Zhou,et al. Lightweight IoT-based authentication scheme in cloud computing circumstance , 2019, Future Gener. Comput. Syst..
[8] Hodjat Hamidi,et al. An approach to develop the smart health using Internet of Things and authentication based on biometric technology , 2019, Future Gener. Comput. Syst..
[9] D. Bhattacharjee,et al. Development Of Smart Detachable Wireless Sensing System For Environmental Monitoring , 2014 .
[10] André Rossi,et al. Heuristics for lifetime maximization in camera sensor networks , 2017, Inf. Sci..
[11] Muhammad Khurram Khan,et al. An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[12] Xuelong Li,et al. A Review of Co-Saliency Detection Algorithms , 2018 .
[13] Ping Wang,et al. Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment , 2015, IEEE Transactions on Dependable and Secure Computing.
[14] Ximeng Liu,et al. SUAA: A Secure User Authentication Scheme with Anonymity for the Single & Multi-server Environments , 2019, Inf. Sci..
[15] Mohammed Feham,et al. Trust Key Management Scheme for Wireless Body Area Networks , 2011, Int. J. Netw. Secur..
[16] Hassan Ghasemzadeh,et al. Context-Aware Data Processing to Enhance Quality of Measurements in Wireless Health Systems: An Application to MET Calculation of Exergaming Actions , 2015, IEEE Internet of Things Journal.
[17] Katia Obraczka,et al. Wireless Smart Camera Networks for the Surveillance of Public Spaces , 2014, Computer.
[18] D. Shalini Punithavathani,et al. Optimized ensemble decision-based multi-focus imagefusion using binary genetic Grey-Wolf optimizer in camera sensor networks , 2016, Multimedia Tools and Applications.
[19] Ashok Kumar Das,et al. A secure and effective biometric‐based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor , 2017, Int. J. Commun. Syst..
[20] Peyman Dodangeh,et al. A biometric security scheme for wireless body area networks , 2018, J. Inf. Secur. Appl..
[21] Li Li,et al. Design and Implementation of a RFID Reader/Router in RFID-WSN Hybrid System , 2018, Future Internet.
[22] Hannu Tenhunen,et al. International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .
[23] Carmen C. Y. Poon,et al. A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.
[24] Chih-Yung Chang,et al. QoS guaranteed surveillance algorithms for directional wireless sensor networks , 2018, Ad Hoc Networks.
[25] Samaher Al-Janabi,et al. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications , 2017 .
[26] Yixian Yang,et al. On development of security monitoring system via wireless sensing network , 2018, EURASIP J. Wirel. Commun. Netw..
[27] Jean-Michel Redoute,et al. An Autonomous Wireless Body Area Network Implementation Towards IoT Connected Healthcare Applications , 2017, IEEE Access.
[28] Yang Wang,et al. Coverage problem with uncertain properties in wireless sensor networks: A survey , 2017, Comput. Networks.
[29] Xingming Sun,et al. Toward Efficient Multi-Keyword Fuzzy Search Over Encrypted Outsourced Data With Accuracy Improvement , 2016, IEEE Transactions on Information Forensics and Security.
[30] Farrukh Aslam Khan,et al. A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks , 2014, FNC/MobiSPC.
[31] Mansaf Alam,et al. BAMHealthCloud: A Biometric Authentication and Data Management System for Healthcare Data in Cloud , 2020, J. King Saud Univ. Comput. Inf. Sci..
[32] Rituparna Chaki,et al. Bio-authentication for layered remote health monitor framework , 2014 .
[33] Xiang-guang Chen,et al. Development of a Wireless Security Monitoring System for CCEL , 2017 .
[34] Chao Yang,et al. Efficient end-to-end authentication protocol for wearable health monitoring systems , 2017, Comput. Electr. Eng..
[35] Za'er Salim Abo-Hammour,et al. Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm , 2014, Inf. Sci..
[36] Yaser Jararweh,et al. Internet of surveillance: a cloud supported large-scale wireless surveillance system , 2016, The Journal of Supercomputing.
[37] Victor Hugo C. De Albuquerque,et al. Health of Things Algorithms for Malignancy Level Classification of Lung Nodules , 2018, IEEE Access.
[38] Kyung Sup Kwak,et al. An Internet of Things-based health prescription assistant and its security system design , 2017, Future Gener. Comput. Syst..
[39] Sherali Zeadally,et al. Taxonomy and analysis of security protocols for Internet of Things , 2018, Future Gener. Comput. Syst..
[40] Harry K. S. Chung,et al. How does reading direction modulate perceptual asymmetry effects? , 2017, Quarterly journal of experimental psychology.
[41] Willy Susilo,et al. Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment , 2020, IEEE Transactions on Dependable and Secure Computing.
[42] Yi Wang,et al. Barrier coverage in camera sensor networks , 2011, MobiHoc '11.
[43] Athanasios V. Vasilakos,et al. Authenticated key management protocol for cloud-assisted body area sensor networks , 2018, J. Netw. Comput. Appl..
[44] Ling Shao,et al. Face recognition with a small occluded training set using spatial and statistical pooling , 2018, Inf. Sci..
[45] Alok Singh,et al. A hybrid evolutionary approach to the registration area planning problem , 2014, Applied Intelligence.
[46] D. Sridharan,et al. Priority based AODV routing protocol for critical data in Wireless Body Area Network , 2015, 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN).
[47] Wei Liang,et al. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.
[48] Xiong Li,et al. An enhanced smart card based remote user password authentication scheme , 2013, J. Netw. Comput. Appl..
[49] Jianfeng Ma,et al. Improvement of robust smart‐card‐based password authentication scheme , 2015, Int. J. Commun. Syst..
[50] Muhammad Khurram Khan,et al. A robust and anonymous patient monitoring system using wireless medical sensor networks , 2018, Future Gener. Comput. Syst..
[51] Xiong Li,et al. An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks , 2017, Multimedia Systems.
[52] Gabriel Neagu,et al. A Cloud-IoT based sensing service for health monitoring , 2017, 2017 E-Health and Bioengineering Conference (EHB).
[53] Guihai Chen,et al. A survey on barrier coverage with sensors , 2016, Frontiers of Computer Science.
[54] I. Székely. ENERGY-EFFICIENT INTEGRATION OF WSNS WITH ACTIVE RFID SYSTEMS , 2011 .
[55] Anand Sharma,et al. Secure Key Agreement with Rekeying Using FLSO Routing Protocol in Wireless Sensor Network , 2018, Wirel. Pers. Commun..
[56] Katia Obraczka,et al. Solar-powered, wireless smart camera network: An IoT solution for outdoor video monitoring , 2018, Comput. Commun..
[57] Wenjing Lou,et al. Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance , 2009, IEEE INFOCOM 2009.
[58] Sukumaran Aasha Nandhini,et al. Efficient compressed sensing-based security approach for video surveillance application in wireless multimedia sensor networks , 2017, Comput. Electr. Eng..
[59] Victor Hugo C. De Albuquerque,et al. An Automated Remote Cloud-Based Heart Rate Variability Monitoring System , 2018, IEEE Access.
[60] Rakesh Kumar,et al. Technological aspects of WBANs for health monitoring: a comprehensive review , 2019, Wirel. Networks.
[61] Xiong Li,et al. A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks , 2015, Comput. Electr. Eng..
[62] R. Saravanan,et al. A Secure Authentication Scheme with User Anonymity for Roaming Service in Global Mobility Networks , 2015, Wirel. Pers. Commun..
[63] Jehn-Ruey Jiang,et al. Barrier coverage with optimized quality for wireless sensor networks , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.
[64] Jocelyne Elias,et al. Optimal design of energy-efficient and cost-effective wireless body area networks , 2014, Ad Hoc Networks.
[65] Guojun Wang,et al. Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks , 2015, ICA3PP.
[66] Xiaoping Li,et al. A Trust Management System for Securing Data Plane of Ad-Hoc Networks , 2016, IEEE Transactions on Vehicular Technology.
[67] G. P. Biswas,et al. Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys , 2015, Wireless Personal Communications.
[68] S. Zeadally,et al. Smart cities , 2016, Commun. ACM.
[69] Dan Tao,et al. A Survey on Barrier Coverage Problem in Directional Sensor Networks , 2015, IEEE Sensors Journal.
[70] Mohammad Hammoudeh,et al. Adaptive routing in wireless sensor networks: QoS optimisation for enhanced application performance , 2015, Inf. Fusion.
[71] Jian Shen,et al. A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks , 2017, Future Gener. Comput. Syst..
[72] Dan J. Kim,et al. Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment , 2018, Decis. Support Syst..
[73] Miquel Oliver,et al. CUIDATS: An RFID-WSN hybrid monitoring system for smart health care environments , 2018, Future Gener. Comput. Syst..
[74] Jie Shen,et al. Fault Tolerant Line-Based Barrier Coverage Formation in Mobile Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[75] Yong Jiang,et al. Fast mutual modulation fusion for multi-sensor images , 2015 .
[76] Tayeb Lemlouma,et al. A survey on health monitoring systems for health smart homes , 2018, International Journal of Industrial Ergonomics.
[77] M. Shamim Hossain,et al. Toward end-to-end biomet rics-based security for IoT infrastructure , 2016, IEEE Wireless Communications.
[78] Zhengwei Jiang. Camera network analysis for visual surveillance in electric industrial context , 2018, J. Vis. Commun. Image Represent..
[79] Yongdong Zhang,et al. Compressive sensing based video scrambling for privacy protection , 2011, 2011 Visual Communications and Image Processing (VCIP).
[80] Yanfei Sun,et al. A Hybrid Security and Compressive Sensing-Based Sensor Data Gathering Scheme , 2015, IEEE Access.
[81] Xiaoying Gan,et al. Critical sensing range for mobile heterogeneous camera sensor networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.