New secure healthcare system using cloud of things
暂无分享,去创建一个
Jiankun Hu | Mohamed Jamal Zemerly | Chan Yeob Yeun | Ebrahim Al Alkeem | Dina Shehada | Jiankun Hu | C. Yeun | D. Shehada | M. Zemerly
[1] Michele Zorzi,et al. Health care applications: a solution based on the internet of things , 2011, ISABEL '11.
[2] L. Gostin,et al. Privacy and security of health information in the emerging health care system. , 1995, Health matrix.
[3] Dongho Won,et al. A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols , 2014, Inf. Sci..
[4] Kwangjo Kim,et al. Secure authenticated group key agreement protocol in the MANET environment , 2008, Inf. Secur. Tech. Rep..
[5] James G. Phillips,et al. Personality and self reported mobile phone use , 2008, Comput. Hum. Behav..
[6] Melanie Swan,et al. Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.0 , 2012, J. Sens. Actuator Networks.
[7] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[8] Kim-Kwang Raymond Choo,et al. A Generic Process to Identify Vulnerabilities and Design Weaknesses in iOS Healthcare Apps , 2015, 2015 48th Hawaii International Conference on System Sciences.
[9] Cecilia Mascolo,et al. METIS: Exploring mobile phone sensing offloading for efficiently supporting social sensing applications , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[10] Chia-Hung Hsiao,et al. Privacy preservation and information security protection for patients' portable electronic health records , 2009, Comput. Biol. Medicine.
[11] Md. Rafiqul Islam,et al. A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering , 2015, SecureComm.
[12] Kim-Kwang Raymond Choo,et al. Forensic Taxonomy of Popular Android mHealth Apps , 2015, AMCIS.
[13] Jan H. P. Eloff,et al. Security in health-care information systems - current trends , 1999, Int. J. Medical Informatics.
[14] Mahmoud Al-Qutayri,et al. Framework for secure wireless health monitoring and remote access system , 2010 .
[15] Mohamed Jamal Zemerly,et al. Lightweight mutual authentication protocol for securing RFID applications , 2010 .
[16] ALESSANDRA TONINELLI,et al. Enabling secure service discovery in mobile healthcare enterprise networks , 2009, IEEE Wireless Communications.
[17] Ernesto Damiani,et al. Data sharing on the cloud: A scalable proxy-based protocol for privacy-preserving queries , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[18] Alptekin Küpçü,et al. Research issues for privacy and security of electronic health services , 2017, Future Gener. Comput. Syst..
[19] M. Eric Johnson,et al. Information security and privacy in healthcare: current state of research , 2010, Int. J. Internet Enterp. Manag..
[20] Chan Yeob Yeun,et al. Lightweight secure storage model with fault-tolerance in cloud environment , 2014, Electronic Commerce Research.
[21] Athanasios V. Vasilakos,et al. A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps , 2017, Appl. Math. Comput..
[22] Kim-Kwang Raymond Choo,et al. A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks , 2014, NSS.
[23] Jong Hyuk Park,et al. Secure and efficient public key management in next generation mobile networks , 2011, Personal and Ubiquitous Computing.
[24] Kim-Kwang Raymond Choo,et al. Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds , 2016, Journal of Medical Systems.
[25] Mohamed Jamal Zemerly,et al. Security and privacy framework for ubiquitous healthcare IoT devices , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[26] Kim-Kwang Raymond Choo,et al. An Android Social App Forensics Adversary Model , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).
[27] K. Harding,et al. The cost-effectiveness of wound management protocols of care. , 2000, British journal of nursing.
[28] Geng Yang,et al. Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare , 2014 .
[29] Mohamed Jamal Zemerly,et al. A Novel Hybrid Cellular Automata Based Cipher System for Internet of Things , 2014 .
[30] Kim-Kwang Raymond Choo,et al. A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.
[31] Arshdeep Bahga,et al. A Cloud-based Approach for Interoperable Electronic Health Records (EHRs) , 2013, IEEE Journal of Biomedical and Health Informatics.
[32] Pedro Castillejo,et al. An Internet of Things Approach for Managing Smart Services Provided by Wearable Devices , 2013, Int. J. Distributed Sens. Networks.
[33] O. Geman,et al. Adopting the Internet of Things technologies in health care systems , 2014, 2014 International Conference and Exposition on Electrical and Power Engineering (EPE).
[34] Chan Yeob Yeun,et al. Framework of a national level electronic health record system , 2012, 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM).
[35] Kim-Kwang Raymond Choo,et al. A technique to circumvent SSL/TLS validations on iOS devices , 2017, Future Gener. Comput. Syst..
[36] Yu-Ru Lin,et al. Elucidating user behavior of mobile learning: A perspective of the extended technology acceptance model , 2007, Electron. Libr..
[37] Jiankun Hu,et al. Corresponding author’s address: , 2022 .
[38] Samee Ullah Khan,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .
[39] L. Srivastava,et al. Mobile phones and the evolution of social behaviour , 2005, Behav. Inf. Technol..
[40] Mohamed Jamal Zemerly,et al. Enhancing the Security of the Shrinking Generator Based Lightweight Mutual Authentication RFID Protocol , 2012 .
[41] Kim-Kwang Raymond Choo. Cryptocurrency and Virtual Currency: Corruption and Money Laundering/Terrorism Financing Risks? , 2015 .
[42] Rajiv Ranjan,et al. Trustworthy Processing of Healthcare Big Data in Hybrid Clouds , 2015, IEEE Cloud Computing.
[43] Daniel Tranel,et al. Exploring the neurological substrate of emotional and social intelligence. , 2003, Brain : a journal of neurology.
[44] Kim-Kwang Raymond Choo,et al. Exfiltrating data from Android devices , 2015, Comput. Secur..
[45] François Michaud,et al. Exploring the use of a mobile robot as an imitation agent with children with low-functioning autism , 2008, Auton. Robots.
[46] Ahmed M. Elmisery,et al. Privacy Preserving Distributed Learning Clustering of HealthCare Data Using Cryptography Protocols , 2010, COMPSAC Workshops.
[47] Robert H. Deng,et al. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.
[48] Thomas B. Sheridan,et al. Healthcare safety: the impact of Disabling "safety" protocols , 2004, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[49] Meng Zhang,et al. MedMon: Securing Medical Devices Through Wireless Monitoring and Anomaly Detection , 2013, IEEE Transactions on Biomedical Circuits and Systems.
[50] Kim-Kwang Raymond Choo,et al. An adversary model to evaluate DRM protection of video contents on iOS devices , 2016, Comput. Secur..
[51] Kim-Kwang Raymond Choo,et al. A Forensically Sound Adversary Model for Mobile Devices , 2015, PloS one.
[52] Ilias Maglogiannis,et al. Bringing IoT and Cloud Computing towards Pervasive Healthcare , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[53] Chan Yeob Yeun,et al. New Secure Storage Architecture for Cloud Computing , 2011 .
[54] Pete Chown,et al. Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) , 2002, RFC.
[55] Yong Yu,et al. Survey on key revocation mechanisms in wireless sensor networks , 2016, J. Netw. Comput. Appl..
[56] Kim-Kwang Raymond Choo,et al. Is the data on your wearable device secure? An Android Wear smartwatch case study , 2017, Softw. Pract. Exp..
[57] Tzonelih Hwang,et al. BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network , 2016, IEEE Sensors Journal.
[58] Sherali Zeadally,et al. An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.
[59] Young B. Choi,et al. Challenges Associated with Privacy in Health Care Industry: Implementation of HIPAA and the Security Rules , 2006, Journal of Medical Systems.
[60] Joonsang Baek,et al. Secure NFC Authentication Protocol Based on LTE Network , 2014 .
[61] Chan Yeob Yeun,et al. New mutual agreement protocol to secure mobile RFID-enabled devices , 2008, Inf. Secur. Tech. Rep..
[62] Zhenfu Cao,et al. An improved identity-based key agreement protocol and its security proof , 2009, Inf. Sci..
[63] Shaopeng Guan,et al. Privacy-Preserving Health Data Collection for Preschool Children , 2013, Comput. Math. Methods Medicine.
[64] Kim-Kwang Raymond Choo. New payment methods: A review of 2010-2012 FATF mutual evaluation reports , 2013, Comput. Secur..
[65] Xiaohui Liang,et al. Security and privacy for mobile healthcare networks: from a quality of protection perspective , 2015, IEEE Wireless Communications.