Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review
暂无分享,去创建一个
[1] B. B. Zaidan,et al. New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files , 2010, ArXiv.
[2] Christoph Busch,et al. Classifying accelerometer data via Hidden Markov Models to authenticate people by the way they walk , 2011, 2011 Carnahan Conference on Security Technology.
[3] Joel J. P. C. Rodrigues,et al. Mobile-health: A review of current state in 2015 , 2015, J. Biomed. Informatics.
[4] Md Rafiqul Islam,et al. "Stego-Analysis Chain, Session Two" Novel Approach of Stego-Analysis System for Image File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[5] B. B. Zaidan,et al. Secure Topology for Electronic Medical Record Transmissions , 2010 .
[6] B. B. Zaidan,et al. Optimization Digital Image Watermarking Technique for Patent Protection , 2010, ArXiv.
[7] B. B. Zaidan,et al. Commercialization Strategy and Implementation Plans for the Proposed Vitual Anti-Spam System based on Feasibility Study , 2015 .
[8] Yang Xiao,et al. Mobile Telemedicine: A Computing and Networking Perspective , 2008 .
[9] A.Z.Ansaef Aos. Securing cover-file of hidden data using statistical technique and aes encryption algorithm , 2009 .
[10] B. B. Zaidan,et al. A Systematic Review on Smartphone Skin Cancer Apps: Coherent Taxonomy, Motivations, Open Challenges and Recommendations, and New Research Direction , 2017, J. Circuits Syst. Comput..
[11] Hamid A. Jalab,et al. A new system for hidden data within header space for EXE-File using object oriented technique , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[12] Hamid A. Jalab,et al. Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance , 2010 .
[13] B. B. Zaidan,et al. Multi-criteria analysis for OS-EMR software selection problem: A comparative study , 2015, Decis. Support Syst..
[14] Seongil Lee,et al. Access to an Automated Security System Using Gesture-Based Passwords , 2012, 2012 15th International Conference on Network-Based Information Systems.
[15] B. B. Zaidan,et al. Overview: Main Fundamentals for Steganography , 2010, ArXiv.
[16] B. B. Zaidan,et al. Intrusion Detection System: Overview , 2010, ArXiv.
[17] Marcos A. Simplício,et al. Mobile health in emerging countries: A survey of research initiatives in Brazil , 2013, Int. J. Medical Informatics.
[18] Prasant Mohapatra,et al. Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones , 2014, MobiSys.
[19] L. Schulmeister. Technology and the Transformation of Oncology Care. , 2016, Seminars in oncology nursing.
[20] A. A. Zaidan,et al. A review of audio based steganography and digital watermarking , 2011 .
[21] A. A. Zaidan,et al. High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm , 2009 .
[22] A. A. Zaidan,et al. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: analytical study , 2010 .
[23] Sheikh Iqbal Ahamed,et al. Seeing Beyond Visibility: A Four Way Fusion of User Authentication for Efficient Usable Security on Mobile Devices , 2014, 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion.
[24] Joel J P C Rodrigues,et al. Looking at Fog Computing for E-Health through the Lens of Deployment Challenges and Applications , 2020, Sensors.
[25] A. A. Zaidan,et al. Novel simulation framework of three-dimensional skull bio-metric measurement , 2009 .
[26] Ahmed Wathik Naji,et al. Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography , 2009 .
[27] A. A. Zaidan,et al. Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review , 2013 .
[28] Andrea F. Abate,et al. I-Am: Implicitly Authenticate Me—Person Authentication on Mobile Devices Through Ear Shape and Arm Gesture , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[29] B. B. Zaidan,et al. Open source EMR software: Profiling, insights and hands-on analysis , 2014, Comput. Methods Programs Biomed..
[30] T. Madhloom,et al. Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis , 2009 .
[31] Bilal Zaidan,et al. Quality of Image vs. Quantity of Data Hidden in the Image , 2009, IPCV.
[32] Miss Laiha Mat Kiah,et al. Suitability of using SOAP protocol to secure electronic medical record databases transmission , 2010 .
[33] A. A. Zaidan,et al. Challenges of Hidden Data in the Unused Area Two within Executable Files , 2009 .
[34] K. Andriole. Security of electronic medical information and patient privacy: what you need to know. , 2014, Journal of the American College of Radiology : JACR.
[35] B. B. Zaidan,et al. A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy , 2015, Journal of Medical Systems.
[36] A. A. Zaidan,et al. StegoMos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem , 2010 .
[37] Gueesang Lee,et al. Implicit authentication based on ear shape biometrics using smartphone camera during a call , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[38] Nasir D. Memon,et al. An HMM-based multi-sensor approach for continuous mobile authentication , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[39] Gonzalo Bailador,et al. Authentication in mobile devices through hand gesture recognition , 2012, International Journal of Information Security.
[40] Anil K. Jain,et al. Continuous authentication of mobile user: Fusion of face image and inertial Measurement Unit data , 2015, 2015 International Conference on Biometrics (ICB).
[41] A. A. Zaidan,et al. Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques , 2018 .
[42] Ming Yang,et al. Secure fingertip mouse for mobile devices , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[43] Guoyou Huang,et al. Bioprinting-Based High-Throughput Fabrication of Three-Dimensional MCF-7 Human Breast Cancer Cellular Spheroids , 2015 .
[44] B. B. Zaidan,et al. Suitability of adopting S/MIME and OpenPGP email messages protocol to secure electronic medical records , 2013, Second International Conference on Future Generation Communication Technologies (FGCT 2013).
[45] Adil Mehmood Khan,et al. Gait fingerprinting-based user identification on smartphones , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).
[46] Christoph Busch,et al. Authentication of Smartphone Users Based on the Way They Walk Using k-NN Algorithm , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[47] A. A. Zaidan,et al. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm , 2010 .
[48] Hai Huang,et al. You Are How You Touch: User Verification on Smartphones via Tapping Behaviors , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[49] B. B. Zaidan,et al. Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects , 2018, Journal of Medical Systems.
[50] Javier Guerra-Casanova,et al. A SEQUENCE ALIGNMENT APPROACH APPLIED TO A MOBILE AUTHENTICATION TECHNIQUE BASED ON GESTURES , 2013 .
[51] Maurizio Talamo,et al. Movement based biometric authentication with smartphones , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).
[52] B. B. Zaidan,et al. Conceptual framework for the security of mobile health applications on Android platform , 2018, Telematics Informatics.
[53] Christoph Busch,et al. Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[54] Tao Feng,et al. Continuous Mobile Authentication Using Virtual Key Typing Biometrics , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[55] Kaigui Bian,et al. TapLock: Exploit finger tap events for enhancing attack resilience of smartphone passwords , 2015, 2015 IEEE International Conference on Communications (ICC).
[56] Jonathan Loo,et al. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing , 2017, Sensors.
[57] Gonzalo Bailador,et al. Score optimization and template updating in a biometric technique for authentication in mobiles based on gestures , 2011, J. Syst. Softw..
[58] Dawu Gu,et al. CLIP: Continuous Location Integrity and Provenance for Mobile Phones , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.
[59] R. Yaw. Health care delivery. , 1971, Hospitals.
[60] A. A. Zaidan,et al. "Stego-Analysis Chain, Session One" Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[61] Silvia Moreno,et al. Remote monitoring system of vital signs for triage and detection of anomalous patient states in the emergency room , 2016, 2016 XXI Symposium on Signal Processing, Images and Artificial Vision (STSIVA).
[62] Patrick Bours,et al. Improved Cycle Detection for Accelerometer Based Gait Authentication , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[63] B. B. Zaidan,et al. Computerized Algorithm for Fetal Heart Rate Baseline and Baseline Variability Estimation based on Distance Between Signal Average and a Value , 2011 .
[64] B. B. Zaidan,et al. Software and Hardware FPGA-Based Digital Watermarking and Steganography Approaches: Toward New Methodology for Evaluation and Benchmarking Using Multi-Criteria Decision-Making Techniques , 2017, J. Circuits Syst. Comput..
[65] Xiaohui Liang,et al. PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs , 2014, Inf. Sci..
[66] A. A. Zaidan,et al. Mobile-Based Patient Monitoring Systems: A Prioritisation Framework Using Multi-Criteria Decision-Making Techniques , 2019, Journal of Medical Systems.
[67] Adam J. Aviv,et al. Practicality of accelerometer side channels on smartphones , 2012, ACSAC '12.
[68] Zulfiqar Ali Memon,et al. Biometric authentication technique using smartphone sensor , 2016, 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
[69] Devu Manikantan Shila,et al. A multi-faceted approach to user authentication for mobile devices — Using human movement, usage, and location patterns , 2016, 2016 IEEE Symposium on Technologies for Homeland Security (HST).
[70] Ruby B. Lee,et al. Implicit Authentication for Smartphone Security , 2015, ICISSP.
[71] B. B. Zaidan,et al. Design and Develop a Video Conferencing Framework for Real-Time Telemedicine Applications Using Secure Group-Based Communication Architecture , 2014, Journal of Medical Systems.
[72] B. B. Zaidan,et al. Challenges, Alternatives, and Paths to Sustainability: Better Public Health Promotion Using Social Networking Pages as Key Tools , 2015, Journal of Medical Systems.
[73] B. B. Zaidan,et al. Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation , 2009, ArXiv.
[74] Fazidah Othman,et al. Securing cover-file without limitation of hidden data size using computation between cryptography and steganography , 2009 .
[75] B. Zaidan,et al. New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm , 2009 .
[76] A. A. Zaidan,et al. Review of mobile short message service security issues and techniques towards the solution , 2011 .
[77] Hamed Ketabdar,et al. MagiThings: Gestural Interaction with Mobile Devices Based on Using Embedded Compass (Magnetic Field) Sensor , 2013, Int. J. Mob. Hum. Comput. Interact..
[78] Ashley Fisher,et al. Review of mobile health technology for military mental health. , 2014, Military medicine.
[79] Zarinah Mohd Kasirun,et al. Hiding Data in Video File: An Overview , 2010 .
[80] A. A. Zaidan,et al. A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi‐criteria analysis based on ‘large‐scale data’ , 2017, Softw. Pract. Exp..
[81] Yu Zhong,et al. Pace independent mobile gait biometrics , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[82] A. A. Zaidan,et al. A Systematic Review for Enabling of Develop a Blockchain Technology in Healthcare Application: Taxonomy, Substantially Analysis, Motivations, Challenges, Recommendations and Future Direction , 2019, Journal of Medical Systems.
[83] Othman Omran Khalifa,et al. A review on multimedia communications cryptography , 2011 .
[84] Zarinah Mohd Kasirun,et al. On the accuracy of hiding information metrics: counterfeit protection for education and important certificates , 2010 .
[85] André Carlos Ponce de Leon Ferreira de Carvalho,et al. Adaptive Algorithms in Accelerometer Biometrics , 2014, 2014 Brazilian Conference on Intelligent Systems.
[86] Rami Alnaqeib,et al. Towards Corrosion Detection System , 2010 .
[87] B. B. Zaidan,et al. Systematic Review of Real-time Remote Health Monitoring System in Triage and Priority-Based Sensor Technology: Taxonomy, Open Challenges, Motivation and Recommendations , 2018, Journal of Medical Systems.
[88] Christoph Busch,et al. Classification of Acceleration Data for Biometric Gait Recognition on Mobile Devices , 2011, BIOSIG.
[89] R B Roth. Health care delivery. , 1972, JAMA.
[90] B. B. Zaidan,et al. Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File , 2009, 2009 International Association of Computer Science and Information Technology - Spring Conference.
[91] A. A. Zaidan,et al. Comprehensive Insights Into the Criteria of Student Performance in Various Educational Domains , 2018, IEEE Access.
[92] B. B. Zaidan,et al. A review of the automated detection and classification of acute leukaemia: Coherent taxonomy, datasets, validation and performance measurements, motivation, open challenges and recommendations , 2018, Comput. Methods Programs Biomed..
[93] Zarinah Mohd Kasirun,et al. On the capacity and security of steganography approaches: An overview , 2010 .
[94] B. B. Zaidan,et al. A Systematic Review for Human EEG Brain Signals Based Emotion Classification, Feature Extraction, Brain Condition, Group Comparison , 2018, Journal of Medical Systems.
[95] Thuc Dinh Nguyen,et al. Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme , 2015, International Journal of Information Security.
[96] René Mayrhofer,et al. An Analysis of Different Approaches to Gait Recognition Using Cell Phone Based Accelerometers , 2013, MoMM '13.
[97] Chunming Qiao,et al. SESAME: Smartphone enabled secure access to multiple entities , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[98] A. A. Zaidan,et al. On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .
[99] Fazida Othman,et al. An Extensive Empirical Study for the Impact of Increasing Data Hidden on the Images Texture , 2009, 2009 International Conference on Future Computer and Communication.
[100] Vincent Sritapan,et al. At Your Fingertips: Considering Finger Distinctness in Continuous Touch-Based Authentication for Mobile Devices , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[101] Nor Badrul Anuar,et al. The rise of keyloggers on smartphones: A survey and insight into motion-based tap inference attacks , 2016, Pervasive Mob. Comput..
[102] B. B. Zaidan,et al. Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects , 2018, Journal of Medical Systems.
[103] Bachar El Hassan,et al. A novel identification/verification model using smartphone's sensors and user behavior , 2013, 2013 2nd International Conference on Advances in Biomedical Engineering.
[104] Xiao Wang,et al. SenSec: Mobile security through passive sensing , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[105] A. A. Zaidan,et al. New Approach of Hidden Data in the portable Executable File without Change the Size of Carrier File Using Statistical Technique , 2009 .
[106] Yang Xiao,et al. Mobile, Secure Tele-Cardiology Based on Wireless and Sensor Networks , 2008 .
[107] Gary M. Weiss,et al. Cell phone-based biometric identification , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[108] Nor Badrul Anuar,et al. The landscape of research on smartphone medical apps: Coherent taxonomy, motivations, open challenges and recommendations , 2015, Comput. Methods Programs Biomed..
[109] Robert H. Deng,et al. Seeing Your Face Is Not Enough: An Inertial Sensor-Based Liveness Detection for Face Authentication , 2015, CCS.
[110] Othman Omran Khalifa,et al. Suitability of using symmetric key to secure multimedia data: an overview, , 2010 .
[111] B. B. Zaidan,et al. Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS , 2015, J. Biomed. Informatics.
[112] B. B. Zaidan,et al. A review of disability EEG based wheelchair control system: Coherent taxonomy, open challenges and recommendations , 2018, Comput. Methods Programs Biomed..
[113] André Carlos Ponce de Leon Ferreira de Carvalho,et al. Adaptive algorithms applied to accelerometer biometrics in a data stream context , 2017, Intell. Data Anal..
[114] A. A. Zaidan,et al. New Design for Information Hiding with in Steganography Using Distortion Techniques , 2010 .
[115] Qiang Liu,et al. A behavioral authentication method for mobile gesture against resilient user posture , 2016, 2016 3rd International Conference on Systems and Informatics (ICSAI).
[116] B. B. Zaidan,et al. Multiclass Benchmarking Framework for Automated Acute Leukaemia Detection and Classification Based on BWM and Group-VIKOR , 2019, Journal of Medical Systems.
[117] A. A. Zaidan,et al. New Comprehensive Study to Assess Comparatively the QKD, XKMS, KDM in the PKI encryption algorithms , 2009 .
[118] B. B. Zaidan,et al. MIRASS: Medical Informatics Research Activity Support System Using Information Mashup Network , 2014, Journal of Medical Systems.
[119] B. B. Zaidan,et al. Based on Real Time Remote Health Monitoring Systems: A New Approach for Prioritization “Large Scales Data” Patients with Chronic Heart Diseases Using Body Sensors and Communication Technology , 2018, Journal of Medical Systems.
[120] B. B. Zaidan,et al. Real-time-based E-health systems: design and implementation of a lightweight key management protocol for securing sensitive information of patients , 2018, Health and Technology.
[121] René Mayrhofer,et al. Cross Pocket Gait Authentication Using Mobile Phone Based Accelerometer Sensor , 2015, EUROCAST.
[122] B. B. Zaidan,et al. Novel Methodology for Triage and Prioritizing Using "Big Data" Patients with Chronic Heart Diseases Through Telemedicine Environmental , 2017, Int. J. Inf. Technol. Decis. Mak..
[123] B. B. Zaidan,et al. Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis , 2018, Health and Technology.
[124] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[125] B. B. Zaidan,et al. Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing , 2014, Journal of Medical Systems.
[126] B. B. Zaidan,et al. A survey on communication components for IoT-based technologies in smart homes , 2018, Telecommunication Systems.
[127] B. B. Zaidan,et al. A distributed framework for health information exchange using smartphone technologies , 2017, J. Biomed. Informatics.
[128] Matt Wolff. Behavioral Biometric Identification on Mobile Devices , 2013, HCI.
[129] A. A. Zaidan,et al. A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standared , 2010 .
[130] Yuji Watanabe,et al. Influence of Holding Smart Phone for Acceleration-Based Gait Authentication , 2014, 2014 Fifth International Conference on Emerging Security Technologies.
[131] Sheikh Iqbal Ahamed,et al. ePet: when cellular phone learns to recognize its owner , 2009, SafeConfig '09.
[132] A. A. Zaidan,et al. An accurate method to obtain bio-metric measurements for three dimensional skull , 2010 .
[133] Toshio Obi,et al. Promoting ICT innovations for the ageing population in Japan , 2013, Int. J. Medical Informatics.
[134] Charles C. Tappert,et al. A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).
[135] B. B. Zaidan,et al. Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-Based Body Sensor Information, Open Challenges and Methodological Aspects , 2018, Journal of Medical Systems.
[136] Marcus Schwarting,et al. On the Obfuscation of Image Sensor Fingerprints , 2015, 2015 Annual Global Online Conference on Information and Computer Technology (GOCICT).
[137] Thuc Dinh Nguyen,et al. A Generalized Authentication Scheme for Mobile Phones Using Gait Signals , 2015, ICETE.
[138] B. B. Zaidan,et al. Based Real Time Remote Health Monitoring Systems: A Review on Patients Prioritization and Related "Big Data" Using Body Sensors information and Communication Technology , 2018, Journal of Medical Systems.
[139] Cuong Pham,et al. SigVer3D: Accelerometer Based Verification of 3-D Signatures on Mobile Devices , 2014, KSE.
[140] Thuc Dinh Nguyen,et al. Adaptive Cross-Device Gait Recognition Using a Mobile Accelerometer , 2013, J. Inf. Process. Syst..
[141] Timothy H. Riehle,et al. Distance bounded energy detecting ultra-wideband impulse radio secure protocol , 2014, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[142] Noureddine Boudriga,et al. Powerless security for Cardiac Implantable Medical Devices: Use of Wireless Identification and Sensing Platform , 2018, J. Netw. Comput. Appl..
[143] Ruby B. Lee,et al. Multi-sensor authentication to improve smartphone security , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).
[144] Omar Zakaria,et al. Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard , 2010, ArXiv.
[145] René Mayrhofer,et al. Accelerometer based Gait Recognition using Adapted Gaussian Mixture Models , 2016, MoMM.
[146] Thuc Dinh Nguyen,et al. On the instability of sensor orientation in gait verification on mobile phone , 2015, 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE).
[147] Rajesh Kumar,et al. Treadmill attack on gait-based authentication systems , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[148] Ahmed Wathik Naji,et al. Optimizing security and flexibility by designing a high security system for e-government servers , 2009 .
[149] Khaled Harfoush,et al. On the practicality of elliptic curve cryptography for medical sensor networks , 2014, 2014 11th Annual High Capacity Optical Networks and Emerging/Enabling Technologies (Photonics for Energy).
[150] A. A. Zaidan,et al. A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution , 2018, Health and Technology.
[151] Babak Naderi,et al. Magnetic signatures in air for mobile devices , 2012, Mobile HCI.
[152] Patrick Bours,et al. Towards an automatic gait recognition system using activity recognition (wearable based) , 2011, 2011 Third International Workshop on Security and Communication Networks (IWSCN).
[153] B. B. Zaidan,et al. Real-Time Medical Systems Based on Human Biometric Steganography: a Systematic Review , 2018, Journal of Medical Systems.
[154] Abdelfettah Belghith,et al. Wireless Body Area Networks: Applications and Technologies , 2016, ANT/SEIT.
[155] Gang Qu,et al. A 3-D hand gesture signature based biometric authentication system for smartphones , 2016, Secur. Commun. Networks.
[156] B. B. Zaidan,et al. Spam influence on business and economy: Theoretical and experimental studies for textual anti-spam filtering using mature document processingand naive Bayesian classifier , 2011 .
[157] Carla Kmett Danielson,et al. Mobile devices for the remote acquisition of physiological and behavioral biomarkers in psychiatric clinical research. , 2017, Journal of psychiatric research.
[158] D. Ben-Zeev,et al. Mobile health (mHealth) for mental health in Asia: objectives, strategies, and limitations. , 2014, Asian journal of psychiatry.
[159] A. A. Zaidan,et al. A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques , 2017 .
[160] René Mayrhofer,et al. Orientation Independent Cell Phone Based Gait Authentication , 2014, MoMM.
[161] Jie Liu,et al. Sensor-Based User Authentication , 2015, EWSN.
[162] Miss Laiha Mat Kiah. Impact of data privacy and confidentiality on developing telemedicine applications: A review participates opinion and expert concerns , 2011 .
[163] A. A. Zaidan,et al. Securing peer-to-peer mobile communications using public key cryptography: New security strategy , 2011 .
[164] A. A. Zaidan,et al. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem , 2010 .
[165] Samira Moussaoui,et al. Performance Evaluation of IEEE 802.15.6 MAC in Monitoring of a Cardiac Patient , 2016, 2016 IEEE 41st Conference on Local Computer Networks Workshops (LCN Workshops).
[166] Marlies Rybnicek,et al. A roadmap to continuous biometric authentication on mobile devices , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[167] S. Palanivel Rajan. Review and investigations on future research directions of mobile based telecare system for cardiac surveillance , 2015 .
[168] Omar Zakaria,et al. An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography , 2011 .
[169] Muhammad Modi bin Lakulu,et al. A Review on Systems-Based Sensory Gloves for Sign Language Recognition State of the Art between 2007 and 2017 , 2018, Sensors.
[170] B. B. Zaidan,et al. Real-Time Remote Health Monitoring Systems Using Body Sensor Information and Finger Vein Biometric Verification: A Multi-Layer Systematic Review , 2018, Journal of Medical Systems.
[171] Omessaad Hamdi,et al. eHealth: Survey on research projects, comparative study of telemonitoring architectures and main issues , 2014, Journal of Network and Computer Applications.
[172] Larry A. Vea,et al. Mobile User Identification through Authentication Using Keystroke Dynamics and Accelerometer Biometrics , 2016, 2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft).
[173] Abeer Alsadoon,et al. Designing Touch-Based Hybrid Authentication Method for Smartphones , 2015 .
[174] Deron Liang,et al. A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability.
[175] A. A. Zaidan,et al. Security improvement of credit card online purchasing system , 2011 .
[176] Lei Yang,et al. Unlocking Smart Phone through Handwaving Biometrics , 2015, IEEE Transactions on Mobile Computing.
[177] A. A. Zaidan,et al. High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain , 2018, Multimedia Tools and Applications.
[178] Xi Wang,et al. Secure session on mobile: An exploration on combining biometric, trustzone, and user behavior , 2014, 6th International Conference on Mobile Computing, Applications and Services.
[179] Mamadou Bilo Doumbouya,et al. A framework for decision making on teleexpertise with traceability of the reasoning , 2015 .
[180] Bruno Crispo,et al. Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[181] A. A. Zaidan,et al. An overview of laser principle, laser–tissue interaction mechanisms and laser safety precautions for medical laser users , 2011 .
[182] Habib Youssef,et al. Lightweight and confidential data aggregation in healthcare wireless sensor networks , 2016, Trans. Emerg. Telecommun. Technol..
[183] Fazida Othman,et al. Stego-Image vs Stego-Analysis System , 2009 .
[184] Yacine Challal,et al. Healing on the cloud: Secure cloud architecture for medical wireless sensor networks , 2016, Future Gener. Comput. Syst..
[185] Yiran Chen,et al. Mobile user classification and authorization based on gesture usage recognition , 2013, 2013 18th Asia and South Pacific Design Automation Conference (ASP-DAC).
[186] Abdelouahid Derhab,et al. Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society , 2015, Comput. Hum. Behav..
[187] Varun Prakash,et al. Touch panel with integrated fingerprint sensors based user identity management , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[188] B. B. Zaidan,et al. New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques , 2010, ArXiv.
[189] B. B. Zaidan,et al. A security framework for mHealth apps on Android platform , 2018, Comput. Secur..
[190] Bilal Bahaa Zaidan,et al. High Rate Video Streaming Steganography , 2009, 2009 International Conference on Future Computer and Communication.
[191] Thorsten Holz,et al. Leveraging Sensor Fingerprinting for Mobile Device Authentication , 2016, DIMVA.
[192] Ragib Hasan,et al. Secure techniques and methods for authenticating visually impaired mobile phone users , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[193] George Demiris,et al. Framing the evidence for health smart homes and home-based consumer health technologies as a public health intervention for independent aging: A systematic review , 2013, Int. J. Medical Informatics.
[194] A. A. Zaidan,et al. New Technique of Hidden Data in PE-File with in Unused Area One , 2009 .
[195] A. A. Zaidan,et al. Investigate the Capability of Applying Hidden Data in Text File: An Overview , 2010 .
[196] B. B. Zaidan,et al. An Enhanced Security Solution for Electronic Medical Records Based on AES Hybrid Technique with SOAP/XML and SHA-1 , 2013, Journal of Medical Systems.
[197] Christoph Busch,et al. Scenario test of accelerometer-based biometric gait recognition , 2011, 2011 Third International Workshop on Security and Communication Networks (IWSCN).
[198] Ming-Hung Shih,et al. A flick biometric authentication mechanism on mobile devices , 2015, 2015 International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS).
[199] An Braeken,et al. Secure Event Logging in Sensor Networks , 2011, EuroPKI.
[200] B. B. Zaidan,et al. New Comparative Study Between DES, 3DES and AES within Nine Factors , 2010, ArXiv.
[201] Bilal Bahaa Zaidan,et al. Impact of spam advertisement through e-mail: A study to assess the influence of the anti-spam on the e-mail marketing , 2010 .
[202] Tsutomu Fujita,et al. Toward Introduction of Immunity-based Model to Continuous Behavior-based User Authentication on Smart Phone , 2013, KES.
[203] Christoph Busch,et al. Context-Aware Mobile Biometric Authentication based on Support Vector Machines , 2013, 2013 Fourth International Conference on Emerging Security Technologies.
[204] Vivek Kanhangad,et al. Exploring orientation and accelerometer sensor data for personal authentication in smartphones using touchscreen gestures , 2015, Pattern Recognit. Lett..
[205] Hamid A. Jalab,et al. An Overview on Hiding Information Technique in Images , 2010 .
[206] B. B. Zaidan,et al. Real-Time Remote-Health Monitoring Systems: a Review on Patients Prioritisation for Multiple-Chronic Diseases, Taxonomy Analysis, Concerns and Solution Procedure , 2019, Journal of Medical Systems.
[207] Gonzalo Bailador,et al. A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer , 2010, NDT.
[208] Yufei Chen,et al. Performance Analysis of Multi-Motion Sensor Behavior for Active Smartphone Authentication , 2018, IEEE Transactions on Information Forensics and Security.
[209] Pong C. Yuen,et al. Finger gesture recognition through sweep sensor , 2009, IMCE '09.
[210] B. B. Zaidan,et al. Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques , 2009, ArXiv.
[211] Abdullah Gani. Novel approach for high (secure and rate) data hidden within triplex space for executable file , 2010 .