A Secure System For Pervasive Social Network-Based Healthcare
暂无分享,去创建一个
[1] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[2] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[3] Gavin Lowe. Casper: a compiler for the analysis of security protocols , 1998 .
[4] Günther Horn,et al. Authentication protocols for mobile network environment value-added services , 2002, IEEE Trans. Veh. Technol..
[5] Sadie Creese,et al. Exploiting Empirical Engagement in Authentication Protocol Design , 2005, SPC.
[6] Upkar Varshney,et al. Pervasive Healthcare and Wireless Health Monitoring , 2007, Mob. Networks Appl..
[7] Wolfgang Fichtner,et al. An Attempt to Model the Human Body as a Communication Channel , 2007, IEEE Transactions on Biomedical Engineering.
[8] Marc Simon Wegmüller,et al. Intra-body communication for biomedical sensor networks , 2007 .
[9] Srdjan Capkun,et al. Proximity-based access control for implantable medical devices , 2009, CCS.
[10] Wail Gueaieb,et al. An ambient intelligent body sensor network for e-Health applications , 2009, 2009 IEEE International Workshop on Medical Measurements and Applications.
[11] A. W. Roscoe,et al. Usability and security of out-of-band channels in secure device pairing protocols , 2009, SOUPS.
[12] Abdulmotaleb El-Saddik,et al. Building Dynamic Social Network From Sensory Data Feed , 2010, IEEE Transactions on Instrumentation and Measurement.
[13] Fengyuan Xu,et al. IMDGuard: Securing implantable medical devices with the external wearable guardian , 2011, 2011 Proceedings IEEE INFOCOM.
[14] Farinaz Koushanfar,et al. Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.
[15] Xin Huang. Multi-channel security protocols in personal networks , 2014 .
[16] Benjamin Fabian,et al. Collaborative and secure sharing of healthcare data in multi-clouds , 2015, Inf. Syst..
[17] Xin Huang,et al. An improved IEEE 802.15.6 password authenticated association protocol , 2015, 2015 IEEE/CIC International Conference on Communications in China (ICCC).
[18] Albert Levi,et al. A Role and Activity Based Access Control for Secure Healthcare Systems , 2015, ISCIS.
[19] Wei Jiang,et al. Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.
[20] Jerome P. Lynch,et al. Three-Tier Modular Structural Health Monitoring Framework Using Environmental and Operational Condition Clustering for Data Normalization: Validation on an Operational Wind Turbine System , 2016, Proceedings of the IEEE.
[21] Haider Abbas,et al. Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges , 2016, Journal of Medical Systems.
[22] Andrew Lippman,et al. A Case Study for Blockchain in Healthcare : “ MedRec ” prototype for electronic health records and medical research data , 2016 .
[23] Jukka Riekki,et al. Privacy as a Service: Protecting the Individual in Healthcare Data Processing , 2016, Computer.
[24] Mohsen Toorani. Security analysis of the IEEE 802.15.6 standard , 2016, Int. J. Commun. Syst..
[25] Kai Lin,et al. A Novel Human Body Area Network for Brain Diseases Analysis , 2016, Journal of Medical Systems.
[26] Xin Huang,et al. An Improved Protocol for the Password Authenticated Association of IEEE 802.15.6 Standard That Alleviates Computational Burden on the Node , 2016, Symmetry.
[27] Kevin J. Peterson,et al. A Blockchain-Based Approach to Health Information Exchange Networks , 2016 .
[28] Bhujbal Yuvaradni,et al. Health Monitoring Services Using Wireless Body Area Network , 2016 .
[29] Jiafu Wan,et al. A multimedia healthcare data sharing approach through cloud-based body area network , 2017, Future Gener. Comput. Syst..