Security algorithms for distributed storage system for E-health application over wireless body area network
暂无分享,去创建一个
[1] Naeem Ramzan,et al. Remote patient monitoring: a comprehensive study , 2017, Journal of Ambient Intelligence and Humanized Computing.
[2] E. O. Nwoye,et al. Novel Algorithm for Decoding Redundant Residue Number Systems (RRNS) Codes , 2012 .
[3] Sinan Q. Salih,et al. TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System , 2020, IEEE Transactions on Industrial Informatics.
[4] Geetha Gurunathan,et al. Secured storage and disease prediction of E-health data in cloud , 2020 .
[5] Radu Sion,et al. TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality , 2014, IEEE Trans. Knowl. Data Eng..
[6] Sinan Q. Salih,et al. Internet of things assisted condition‐based support for smart manufacturing industry using learning technique , 2020, Comput. Intell..
[7] Sinan Q. Salih,et al. DependData: Data collection dependability through three-layer decision-making in BSNs for healthcare monitoring , 2020, Inf. Fusion.
[8] Ingrid Moerman,et al. A Comprehensive Survey of Wireless Body Area Networks , 2012, Journal of Medical Systems.
[9] Ling Liu,et al. Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[10] Musheer Ahmad,et al. A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map , 2018, Neural Computing and Applications.
[11] Javed Iqbal,et al. Traffic priority based delay-aware and energy efficient path allocation routing protocol for wireless body area network , 2019, J. Ambient Intell. Humaniz. Comput..
[12] Abdennaceur Kachouri,et al. Wireless body area network for e-health applications: Overview , 2017, 2017 International Conference on Smart, Monitored and Controlled Cities (SM2C).
[13] Mohamed Elhoseny,et al. A secure real-time internet of medical smart things (IOMST) , 2018, Comput. Electr. Eng..
[14] Sindhu Hak Gupta,et al. An approach to investigate the best location for the central node placement for energy efficient WBAN , 2020, Journal of Ambient Intelligence and Humanized Computing.
[15] M. A. Mokhtar,et al. Security for wireless sensor network , 2016, 2016 6th International Conference on Information Communication and Management (ICICM).
[16] Alexandros G. Dimakis,et al. Security in distributed storage systems by communicating a logarithmic number of bits , 2010, 2010 IEEE International Symposium on Information Theory.
[17] Ahmed Farouk,et al. Secure Medical Data Transmission Model for IoT-Based Healthcare Systems , 2018, IEEE Access.
[18] Ernesto Damiani,et al. A polling access control with exhaustive service in wireless body area networks for mobile healthcare using the sleeping schema , 2019, J. Ambient Intell. Humaniz. Comput..
[19] Mohamed Elhoseny,et al. Collaborative task assignment of interconnected, affective robots towards autonomous healthcare assistant , 2019, Future Gener. Comput. Syst..
[20] Balasubramaniam Natarajan,et al. Redundant residue number system based space-time block codes , 2014, Phys. Commun..
[21] Zuqing Zhu,et al. Availability-aware survivable virtual network embedding in optical datacenter networks , 2015, IEEE/OSA Journal of Optical Communications and Networking.
[22] Thomas Peltier,et al. Information Security Fundamentals, Second Edition , 2013 .
[23] A. Jakubski. Selected application of the Chinese Remainder Theorem in multiparty computation , 2016 .
[24] Min Chen,et al. An Integrated Biometric-Based Security Framework Using Wavelet-Domain HMM in Wireless Body Area Networks (WBAN) , 2011, 2011 IEEE International Conference on Communications (ICC).
[25] P. Pandiaraja,et al. RETRACTED ARTICLE: E health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption , 2020, Journal of Ambient Intelligence and Humanized Computing.
[26] Chip-Hong Chang,et al. A new algorithm for single residue digit error correction in Redundant Residue Number System , 2014, 2014 IEEE International Symposium on Circuits and Systems (ISCAS).
[27] Kyung Sup Kwak,et al. Hybrid security mechanisms for wireless body area networks , 2010, 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN).
[28] Mohamed Elhoseny,et al. The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems , 2017, Journal of Ambient Intelligence and Humanized Computing.
[29] Indumathi Jayaraman,et al. RETRACTED ARTICLE: A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud , 2020, Journal of Ambient Intelligence and Humanized Computing.
[30] Kannan Ramchandran,et al. Securing Dynamic Distributed Storage Systems Against Eavesdropping and Adversarial Attacks , 2010, IEEE Transactions on Information Theory.
[31] Amit Kumar Singh,et al. Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications , 2018, Multimedia Tools and Applications.