Octopus: A Novel Approach for Health Data Masking and Retrieving Using Physical Unclonable Functions and Machine Learning
暂无分享,去创建一个
[1] Pintu Kumar Sadhu,et al. NAHAP: PUF-Based Three Factor Authentication System for Internet of Medical Things , 2023, IEEE Consumer Electronics Magazine.
[2] Pintu Kumar Sadhu,et al. Physical Unclonable Function and Machine Learning Based Group Authentication and Data Masking for In-Hospital Segments , 2022, Electronics.
[3] Zhelong Wang,et al. Analysis and evaluation of hemiplegic gait based on wearable sensor network , 2022, Inf. Fusion.
[4] Pintu Kumar Sadhu,et al. Internet of Things: Security and Solutions Survey , 2022, Sensors.
[5] A. Pathan,et al. Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis , 2022, J. Cybersecur. Priv..
[6] Pintu Kumar Sadhu,et al. Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions , 2022, Sensors.
[7] Pintu Kumar Sadhu,et al. MC- PUF: A Robust Lightweight Controlled Physical Unclonable Function for Resource Constrained Environments , 2022, 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).
[8] Venkata K. V. V. Bathalapalli,et al. PUFchain 2.0: Hardware-Assisted Robust Blockchain for Sustainable Simultaneous Device and Data Security in Smart Healthcare , 2022, SN Computer Science.
[9] Pintu Kumar Sadhu,et al. Easy-Sec: PUF-Based Rapid and Robust Authentication Framework for the Internet of Vehicles , 2022, ArXiv.
[10] Kumar Yelamarthi,et al. Performance Analysis of Ring Oscillator PUF for Robust Security in Smart Transportation , 2021, 2021 IEEE 7th World Forum on Internet of Things (WF-IoT).
[11] Sahshanu Razdan,et al. Internet of Medical Things (IoMT): Overview, Emerging Technologies, and Case Studies , 2021, IETE Technical Review.
[12] G. Díez-Señorans,et al. Introduction to Physically Unclonable Fuctions: Properties and Applications , 2020, 2020 European Conference on Circuit Theory and Design (ECCTD).
[13] Linesh Raja,et al. Light-weighted cryptographic algorithms for energy efficient applications , 2020 .
[14] Yingnan Sun,et al. Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey , 2019, IEEE Access.
[15] Sunil K. Khatri,et al. Smart E-Healthcare with Internet of Things: Current Trends, Challenges, Solutions, and Technologies , 2019, From Visual Surveillance to Internet of Things.
[16] Moayad Aloqaily,et al. An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.
[17] Mohsen Guizani,et al. A Decade of Internet of Things: Analysis in the Light of Healthcare Applications , 2019, IEEE Access.
[18] Deepak Puthal,et al. PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things , 2019, IEEE Transactions on Consumer Electronics.
[19] Sotiris Ioannidis,et al. Review of Security and Privacy for the Internet of Medical Things (IoMT) , 2019, 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS).
[20] Panagiotis G. Sarigiannidis,et al. Securing the Internet of Things: Challenges, threats and solutions , 2019, Internet Things.
[21] A. B. Hssane,et al. Big healthcare data: preserving security and privacy , 2018, Journal of Big Data.
[22] Sridhar Krishnan,et al. Wearable Hardware Design for the Internet of Medical Things (IoMT) , 2018, Sensors.
[23] Yasir Mehmood,et al. Internet-of-Things-Based Smart Cities: Recent Advances and Challenges , 2017, IEEE Communications Magazine.
[24] Georgios Kambourakis,et al. DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.
[25] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[26] Munindar P. Singh,et al. Continuous Authentication and Authorization for the Internet of Things , 2017, IEEE Internet Computing.
[27] Amarsinh Vidhate,et al. Security attacks in IoT: A survey , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[28] Derek Abbott,et al. PUF-FSM: A Controlled Strong PUF , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[29] Mark Zwolinski,et al. Overview of PUF-based hardware security solutions for the internet of things , 2016, 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS).
[30] Maryline Laurent-Maknavicius,et al. Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.
[31] Hannu Tenhunen,et al. Smart e-Health Gateway: Bringing intelligence to Internet-of-Things based ubiquitous healthcare systems , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[32] Kyung-Sup Kwak,et al. The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.
[33] Srinivas Devadas,et al. Physical Unclonable Functions and Applications: A Tutorial , 2014, Proceedings of the IEEE.
[34] Tanja Lange,et al. Factoring RSA keys from certified smart cards: Coppersmith in the wild , 2013, IACR Cryptol. ePrint Arch..
[35] D. Kuritzkes,et al. Hematopoietic cell transplantation and HIV cure: where we are and what next? , 2013, Blood.
[36] J. S. Shah,et al. Performace Analysis of Encryption and Decryption Using Genetic Based Cancelable Non-invertible Fingerprint Based Key in MANET , 2012, 2012 International Conference on Communication Systems and Network Technologies.
[37] Pardeep Kumar,et al. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.
[38] Yan Gu,et al. A Performance Analysis of Identity-Based Encryption Schemes , 2011, INTRUST.
[39] Niraj K. Jha,et al. Hijacking an insulin pump: Security attacks and defenses for a diabetes therapy system , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.
[40] Yunmo Chung,et al. Advanced universal remote controller for home automation and security , 2010, IEEE Transactions on Consumer Electronics.
[41] Sergei Skorobogatov,et al. Optical Fault Masking Attacks , 2010, 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[42] Christophe Clavier,et al. Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings , 2009, CHES.
[43] Michael Hutter,et al. Optical Fault Attacks on AES: A Threat in Violet , 2009, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC).
[44] Dick James,et al. The State-of-the-Art in IC Reverse Engineering , 2009, CHES.
[45] Srivaths Ravi,et al. A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.
[46] Ghulam Muhammad,et al. A Comprehensive Survey of the Internet of Things (IoT) and AI-Based Smart Healthcare , 2021, IEEE Access.
[47] Salma Lbrini,et al. Big Health Data: Cardiovascular Disease Prevention Using Big Data and Machine Learning , 2021 .
[48] B. Bhushan,et al. IoT Enabled Technology in Secured Healthcare: Applications, Challenges and Future Directions , 2020 .
[49] Jean-Luc Danger,et al. Self-Secured PUF: Protecting the Loop PUF by Masking , 2020, IACR Cryptol. ePrint Arch..
[50] Tobias Nilges,et al. The Cryptographic Strength of Tamper-Proof Hardware , 2015 .
[51] S. R. Jino Ramson,et al. Energy-Aware Duty Cycle Scheduling for Efficient Data Collection in Wireless Sensor Networks , 2013 .