Secure Edge of Things for Smart Healthcare Surveillance Framework
暂无分享,去创建一个
Mohsen Guizani | Ibrahim Khalil | Xun Yi | Abdulatif Alabdulatif | X. Yi | M. Guizani | I. Khalil | A. Alabdulatif
[1] Subasish Mohapatra,et al. Sensor-Cloud: A Hybrid Framework for Remote Patient Monitoring , 2012 .
[2] Thomas Neubauer,et al. A secure architecture for the pseudonymization of medical data , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[3] Hannu Tenhunen,et al. Smart e-Health Gateway: Bringing intelligence to Internet-of-Things based ubiquitous healthcare systems , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[4] Mehmet A. Orgun,et al. Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions , 2018, IEEE Access.
[5] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[6] Jemal H. Abawajy,et al. Privacy Preserving Social Network Data Publication , 2016, IEEE Communications Surveys & Tutorials.
[7] Juan E. Tapiador,et al. Security and privacy issues in implantable medical devices: A comprehensive survey , 2015, J. Biomed. Informatics.
[8] Ayman Ibaida,et al. BDCaM: Big Data for Context-Aware Monitoring—A Personalized Knowledge Discovery Framework for Assisted Healthcare , 2017, IEEE Transactions on Cloud Computing.
[9] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[10] Mario Gerla,et al. Personal gateway in mobile health monitoring , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[11] Sergiu-Dan Stan,et al. Platform as a service gateway for the Fog of Things , 2017, Adv. Eng. Informatics.
[12] Amit K. Roy-Chowdhury,et al. Context-Aware Activity Recognition and Anomaly Detection in Video , 2013, IEEE Journal of Selected Topics in Signal Processing.
[13] A. Pfitzmann,et al. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology , 2002 .
[14] José Luis Fernández Alemán,et al. Security and privacy in electronic health records: A systematic literature review , 2013, J. Biomed. Informatics.
[15] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[16] Yoosoo Oh,et al. A context management architecture for large-scale smart environments , 2010, IEEE Communications Magazine.
[17] V. J. Rayward-Smith,et al. Fuzzy Cluster Analysis: Methods for Classification, Data Analysis and Image Recognition , 1999 .
[18] Mehmet Hadi Gunes,et al. Ensuring access control in cloud provisioned healthcare systems , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[19] Samee Ullah Khan,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .
[20] Rongxing Lu,et al. From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework , 2017, IEEE Access.
[21] Agostinho C. Rosa,et al. Spectrometric differentiation of yeast strains using minimum volume increase and minimum direction change clustering criteria , 2014, Pattern Recognit. Lett..
[22] Ilias Maglogiannis,et al. Bringing IoT and Cloud Computing towards Pervasive Healthcare , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[23] KeeHyun Park,et al. An Integrated Gateway for Various PHDs in U-Healthcare Environments , 2012, Journal of biomedicine & biotechnology.
[24] Qiang Chen,et al. A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor, and Intelligent Medicine Box , 2014, IEEE Transactions on Industrial Informatics.
[25] Mohsen Guizani,et al. Privacy in the Internet of Things for Smart Healthcare , 2018, IEEE Communications Magazine.
[26] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[27] Chaewoo Lee,et al. Mobile Gateway for Ubiquitous Health Care System Using ZigBee and Bluetooth , 2014, 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[28] Yuguang Fang,et al. Privacy and emergency response in e-healthcare leveraging wireless body sensor networks , 2010, IEEE Wireless Communications.
[29] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[30] Ciprian Dobre,et al. Big Data and Internet of Things: A Roadmap for Smart Environments , 2014, Big Data and Internet of Things.
[31] Albert Y. Zomaya,et al. Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities , 2019, J. Parallel Distributed Comput..
[32] Mohsen Guizani,et al. Softwarization of Internet of Things Infrastructure for Secure and Smart Healthcare , 2017, Computer.