Secure IoT e-Health Applications using VICINITY Framework and GDPR Guidelines
暂无分享,去创建一个
Dimitrios Tzovaras | Stefan Vanya | Viktor Oravec | Athanasios Tryferidis | Maria Koutli | Natalia Theologou | Aimilia Kagkini | Dimitrios Zandes | Konstantinos Karkaletsis | Konstantinos Kaggelides | Jorge Almela Miralles | D. Tzovaras | S. Vanya | V. Oravec | Athanasios Tryferidis | Natalia Theologou | Aimilia Kagkini | M. Koutli | Dimitrios Zandes | Konstantinos Karkaletsis | Konstantinos Kaggelides
[1] Peter Saint-Andre,et al. Extensible Messaging and Presence Protocol (XMPP): Core , 2004, RFC.
[2] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[3] Sheetal Kalra,et al. Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..
[4] Aafaf Ouaddah,et al. Chapter Eight - A blockchain based access control framework for the security and privacy of IoT with strong anonymity unlinkability and intractability guarantees , 2019, Adv. Comput..
[5] S. Smys,et al. Intelligent security framework for iot devices cryptography based end-to-end security architecture , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).
[6] Elisa Bertino,et al. Internet of Things (IoT) , 2016, ACM Trans. Internet Techn..
[7] Bashar Nuseibeh,et al. Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms , 2016, IOT.
[8] Ali Dehghantanha,et al. Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[9] Yvonne O'Connor,et al. Privacy by Design: Informed Consent and Internet of Things for Smart Health , 2017, EUSPN/ICTH.
[10] Nazmus Sakib,et al. Performance analysis of security algorithms for IoT devices , 2017, 2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC).
[11] Hwajeong Seo,et al. Secure IoT framework and 2D architecture for End-To-End security , 2018, The Journal of Supercomputing.
[12] Howon Kim,et al. The intelligent IoT common service platform architecture and service implementation , 2018, The Journal of Supercomputing.
[13] Dimitrios Tzovaras,et al. e-Health Services in the Context of IoT: The Case of the VICINITY Project , 2018, AIAI.
[14] Victor I. Chang,et al. Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare , 2018, Future Gener. Comput. Syst..
[15] Hannu Tenhunen,et al. International Conference on Ambient Systems , Networks and Technologies ( ANT 2015 ) SEA : A Secure and E ffi cient Authentication and Authorization Architecture for IoT-Based Healthcare Using Smart Gateways , 2015 .
[16] Juan C. Vasquez,et al. An open virtual neighbourhood network to connect IoT infrastructures and smart objects — Vicinity: IoT enables interoperability as a service , 2017, 2017 Global Internet of Things Summit (GIoTS).
[17] Mahmoud Ammar,et al. Journal of Information Security and Applications , 2022 .
[18] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[19] Sanjay Jha,et al. Automated Analysis of Secure Internet of Things Protocols , 2017, ACSAC.
[20] Davide Bacciu,et al. An experimental characterization of reservoir computing in ambient assisted living applications , 2013, Neural Computing and Applications.
[21] Andrei V. Gurtov,et al. Two-phase authentication protocol for wireless sensor networks in distributed IoT applications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[22] Wan Haslina Hassan,et al. Current research on Internet of Things (IoT) security: A survey , 2019, Comput. Networks.