Internet of things security in healthcare : A test-suite and standard review
暂无分享,去创建一个
[1] Miodrag Potkonjak,et al. Data integrity attacks and defenses for Intel lab sensor network , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[2] Linda Little,et al. E-health , 2008, BCS HCI.
[3] Barbara Kitchenham,et al. Procedures for Performing Systematic Reviews , 2004 .
[4] Mohd Anwar,et al. Security & Privacy Challenges in IoT-Based Health Cloud , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).
[5] Mohammed Bouhorma,et al. The Internet of Things for healthcare monitoring: Security review and proposed solution , 2014, 2014 Third IEEE International Colloquium in Information Science and Technology (CIST).
[6] Shashikant Ghumbre,et al. A survey on IoT applications, security challenges and counter measures , 2016, 2016 International Conference on Computing, Analytics and Security Trends (CAST).
[7] Apurva Mohan,et al. Cyber Security for Personal Medical Devices Internet of Things , 2014, 2014 IEEE International Conference on Distributed Computing in Sensor Systems.
[8] Mehmet A. Orgun,et al. Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions , 2018, IEEE Access.
[9] Surya Nepal,et al. An autonomic framework for enhancing the quality of data grid services , 2012, Future Gener. Comput. Syst..
[10] Jean-Pierre Hubaux,et al. Security and Cooperation in Wireless Networks , 2007, ESAS.
[11] Samir Chatterjee,et al. A Design Science Research Methodology for Information Systems Research , 2008 .
[12] Wassnaa Al-Mawee,et al. Privacy and Security Issues in IoT Healthcare Applications for the Disabled Users a Survey , 2012 .
[13] Ahima. Role of the Personal Health Record in the EHR (2010 update) - Retired , 2010 .
[14] Xavier J. A. Bellekens,et al. When eHealth meets the internet of things: Pervasive security and privacy challenges , 2017, 2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security).
[15] Leckraj Nagowah,et al. A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare , 2017, 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS).
[16] Lars R. Knudsen,et al. Advanced Encryption Standard (AES) - An Update , 1999, IMACC.
[17] Klaus D. McDonald-Maier,et al. A secure cloud framework for ICMetric based IoT health devices , 2017, ICC.
[18] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[19] Victor I. Chang,et al. Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare , 2018, Future Gener. Comput. Syst..
[20] Tzonelih Hwang,et al. BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network , 2016, IEEE Sensors Journal.
[21] Lyman Chapin,et al. THE INTERNET OF THINGS : AN OVERVIEW Understanding the Issues and Challenges of a More Connected World , 2015 .
[22] Michael E. Miller,et al. Electronic Health Records , 2014, Annals of Internal Medicine.
[23] Mohsen Guizani,et al. Access Control Schemes for Implantable Medical Devices: A Survey , 2017, IEEE Internet of Things Journal.
[24] Shailja Dahiya,et al. Element-key table based complex key generation (E-CKG) for IoT based health care networks , 2017, SIN.
[25] Ahmed Serhrouchni,et al. Analysis of authentication techniques in Internet of Things (IoT) , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).
[26] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality [including updates through 7/20/2007] , 2004 .