Seamless connectivity architecture and methods for IoT and wearable devices
暂无分享,去创建一个
[1] Muhammad Khurram Khan,et al. A robust and anonymous patient monitoring system using wireless medical sensor networks , 2018, Future Gener. Comput. Syst..
[2] Mahdokht Kalantari,et al. Consumers' adoption of wearable technologies: literature review, synthesis, and future research agenda , 2017 .
[3] Janne Merete Hagen,et al. Bluetooth security and threats , 2015 .
[4] Chungui Liu,et al. Community Medical Network (CMN): Architecture and implementation , 2011, 2011 Global Mobile Congress.
[5] Paula Fikkert,et al. Specification of the Bluetooth System , 2003 .
[6] Prosanta Gope,et al. An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks , 2016, J. Netw. Comput. Appl..
[7] Jing Xu,et al. Provable secure authentication protocol with anonymity for roaming service in global mobility networks , 2011, Comput. Networks.
[8] Maria Lindén,et al. A Systematic Review of Wearable Patient Monitoring Systems – Current Challenges and Opportunities for Clinical Adoption , 2017, Journal of Medical Systems.
[9] Eun-Jun Yoon,et al. A user friendly authentication scheme with anonymity for wireless communications , 2011, Comput. Electr. Eng..
[10] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[11] Prabal Dutta,et al. The Internet of Things Has a Gateway Problem , 2015, HotMobile.
[12] Tiago M. Fernández-Caramés,et al. A Practical Evaluation on RSA and ECC-Based Cipher Suites for IoT High-Security Energy-Efficient Fog and Mist Computing Devices , 2018, Sensors.
[13] Wen-Chung Kuo,et al. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity , 2016 .
[14] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.
[15] A. Alhogail. Improving IoT Technology Adoption through Improving Consumer Trust , 2018, Technologies.
[16] Christer Åhlund,et al. Opportunistic Mobility Support for Resource Constrained Sensor Devices in Smart Cities , 2015, Sensors.
[17] Pijush Kanti Dutta Pramanik,et al. WBAN: Driving e-healthcare Beyond Telemedicine to Remote Health Monitoring , 2019, Telemedicine Technologies.
[18] Ratko Magjarević,et al. WBAN for Physical Activity Monitoring in Health Care and Wellness , 2013 .
[19] L. Piwek,et al. The Rise of Consumer Health Wearables: Promises and Barriers , 2016, PLoS medicine.
[20] Karen A. Scarfone,et al. Guide to Bluetooth Security , 2008 .
[21] Chan Yeob Yeun,et al. Advanced Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks , 2016, Wireless Personal Communications.
[22] Moti Yung,et al. Ephemeral Identifiers: Mitigating Tracking & Spoofing Threats to BLE Beacons , 2016 .
[23] Jianfeng Ma,et al. A new authentication scheme with anonymity for wireless environments , 2004, IEEE Trans. Consumer Electron..
[24] Richard F. Sesek,et al. Barriers to the Adoption of Wearable Sensors in the Workplace: A Survey of Occupational Safety and Health Professionals , 2018, Hum. Factors.
[25] Jeffrey Soar,et al. Older people, assistive technologies, and the barriers to adoption: A systematic review , 2016, Int. J. Medical Informatics.
[26] Ratko Magjarević,et al. System for Assisted Exercising and Qualitative Exercise Assessment , 2015 .
[27] Mehmet Rasit Yuce,et al. Wireless Body Area Network (WBAN) for Medical Applications , 2010 .
[28] J. Coughlin,et al. PERSPECTIVE: Older Adults' Adoption of Technology: An Integrated Approach to Identifying Determinants and Barriers , 2015 .
[29] Marc Dacier,et al. Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services , 2015, USENIX Security Symposium.
[30] Parmit K. Chilana,et al. Acceptance of Commercially Available Wearable Activity Trackers Among Adults Aged Over 50 and With Chronic Illness: A Mixed-Methods Evaluation , 2016, JMIR mHealth and uHealth.
[31] Cheng-Chi Lee,et al. Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments , 2006, IEEE Transactions on Industrial Electronics.
[32] Parth H. Pathak,et al. Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers , 2016, HotMobile.
[33] Brenda Leticia Flores Ríos,et al. Tracking the Evolution of the Internet of Things Concept Across Different Application Domains , 2017, Sensors.
[34] Yao Zhang,et al. A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks , 2018, J. Netw. Comput. Appl..