A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data
暂无分享,去创建一个
Mohammad Ayoub Khan | Mohammad Tabrez Quasim | Norah Saleh Alghamdi | Mohammad Yahiya Khan | N. Alghamdi | Mohammad Yahiya Khan | M. Quasim | Mohammad Ayoub Khan
[1] Xiong Li,et al. A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks , 2016, Secur. Commun. Networks.
[2] Wei Xiang,et al. Internet of Things for Smart Healthcare: Technologies, Challenges, and Opportunities , 2017, IEEE Access.
[3] Azizi Harun,et al. Internet of Things (IOT) Monitoring System for Elderly , 2018, 2018 International Conference on Intelligent and Advanced System (ICIAS).
[4] Harit Shah,et al. Security Issues on Cloud Computing , 2013, ArXiv.
[5] S. El-Rabaie,et al. Homomorphic image encryption , 2009, J. Electronic Imaging.
[6] Mohamed Abdel-Basset,et al. A novel group decision making model based on neutrosophic sets for heart disease diagnosis , 2019, Multimedia Tools and Applications.
[7] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[8] Ahmed E. Youssef,et al. A Framework for A Framework for A Framework for A Framework for SSSSeeeeccccure Cloud ure Cloud ure Cloud ure Cloud ComputingComputingComputingComputing , 2012 .
[9] Lisandro Zambenedetti Granville,et al. Internet of Things in healthcare: Interoperatibility and security issues , 2012, 2012 IEEE International Conference on Communications (ICC).
[10] Osama M. Abu Zaid,et al. Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..
[11] Snehal Chaudhari,et al. The System for Early Detection of Heart-Attack , 2018 .
[12] Chun-Ta Li,et al. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..
[13] Kefei Chen,et al. Efficient User Access Control Mechanism for Wireless Multimedia Sensor Networks , 2011 .
[14] Matei Ciobanu Morogan,et al. Identity-based Authentication and Access Control in Wireless Sensor Networks , 2012 .
[15] Jian Shen,et al. A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks , 2017, Future Gener. Comput. Syst..
[16] Karan Mitra,et al. IReHMo: An efficient IoT-based remote health monitoring system for smart regions , 2015, 2015 17th International Conference on E-health Networking, Application & Services (HealthCom).
[17] Giancarlo Succi,et al. Authentication in cloud-driven IoT-based big data environment: Survey and outlook , 2019, J. Syst. Archit..
[18] Qiaoyan Wen,et al. An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network , 2012, Comput. Commun..
[19] Bo Sheng,et al. Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.
[20] Osval A. Montesinos-López,et al. An IoT System for Remote Health Monitoring in Elderly Adults through a Wearable Device and Mobile Application , 2019, Geriatrics.
[21] El-Sayed M. El-Rabaie,et al. HEVC Selective Encryption Using RC6 Block Cipher Technique , 2018, IEEE Transactions on Multimedia.
[22] Moayad Aloqaily,et al. An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.
[23] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[24] Kuo-Hui Yeh,et al. A Secure IoT-Based Healthcare System With Body Sensor Networks , 2016, IEEE Access.
[25] Hari Om,et al. Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines , 2016, Comput. Networks.
[26] Djamel Tandjaoui,et al. A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things , 2015, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies.
[27] Alessandra Pieroni,et al. E-health-IoT Universe: A Review , 2017 .
[28] J. Vijayashree,et al. A Machine Learning Framework for Feature Selection in Heart Disease Classification Using Improved Particle Swarm Optimization with Support Vector Machine Classifier , 2019, Programming and Computer Software.
[29] Hesham A. El Zouka,et al. Secure IoT communications for smart healthcare monitoring system , 2019, Internet Things.
[30] Prosanta Gope,et al. A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.
[31] Kaja Abbas,et al. Big Data Analytics in Healthcare Internet of Things , 2017 .
[32] N. Arunkumar,et al. Enabling technologies for fog computing in healthcare IoT systems , 2019, Future Gener. Comput. Syst..
[33] Elaine B. Barker,et al. Recommendation for Key Management Part 3: Application-Specific Key Management Guidance , 2009 .
[34] Hemraj Saini,et al. A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology , 2019, Multimedia Tools and Applications.
[35] Reza Malekian,et al. A novel and secure IoT based cloud centric architecture to perform predictive analysis of users activities in sustainable health centres , 2017, Multimedia Tools and Applications.
[36] O. KuyoroS.,et al. Cloud computing security issues and challenges , 2011 .
[37] P. J. A. Alphonse,et al. An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System , 2019, Journal of Medical Systems.
[38] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[39] Ming Li,et al. Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.
[40] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[41] Sapna Tyagi,et al. A conceptual framework for IoT-based healthcare system using cloud computing , 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence).
[42] Heejo Lee,et al. An energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography , 2009, Journal of Communications and Networks.
[43] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[44] Ling Liu,et al. Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[45] Hyeonjoon Moon,et al. A Survey on Internet of Things and Cloud Computing for Healthcare , 2019, Electronics.
[46] Mayank Mishra,et al. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping , 2006 .
[47] Fizar Ahmed,et al. An Internet of Things (IoT) Application for Predicting the Quantity of Future Heart Attack Patients , 2017 .
[48] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.