Distributed privacy protection strategy for MEC enhanced wireless body area networks
暂无分享,去创建一个
[1] Hang Shi,et al. A Feature-Based Learning System for Internet of Things Applications , 2019, IEEE Internet of Things Journal.
[2] Robin Doss,et al. Establishing trust relationships in OppNets using Merkle trees , 2016, 2016 8th International Conference on Communication Systems and Networks (COMSNETS).
[3] Danna Zhou,et al. d. , 1934, Microbial pathogenesis.
[4] Pan Li,et al. Channel State Information Prediction for 5G Wireless Communications: A Deep Learning Approach , 2020, IEEE Transactions on Network Science and Engineering.
[5] Jian Shen,et al. An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain , 2018, IEEE Access.
[6] Xiao Wang,et al. Blockchain-Powered Parallel Healthcare Systems Based on the ACP Approach , 2018, IEEE Transactions on Computational Social Systems.
[7] Wei Jiang,et al. Healthcare Data Gateways: Found Healthcare Intelligence on Blockchain with Novel Privacy Risk Control , 2016, Journal of Medical Systems.
[8] Rui Guo,et al. Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems , 2018, IEEE Access.
[9] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[10] Junjie Yan,et al. Social Attribute Aware Incentive Mechanism for Device-to-Device Video Distribution , 2017, IEEE Transactions on Multimedia.
[11] Athanasios V. Vasilakos,et al. Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks † , 2016, Sensors.
[12] Andrew Lippman,et al. A Case Study for Blockchain in Healthcare : “ MedRec ” prototype for electronic health records and medical research data , 2016 .
[13] Qing Yang,et al. Cache Less for More: Exploiting Cooperative Video Caching and Delivery in D2D Communications , 2019, IEEE Transactions on Multimedia.
[14] Shaoen Wu,et al. Biologically Inspired Resource Allocation for Network Slices in 5G-Enabled Internet of Things , 2019, IEEE Internet of Things Journal.
[15] Daniel T. H. Lai,et al. A Review of Implant Communication Technology in WBAN: Progress and Challenges , 2019, IEEE Reviews in Biomedical Engineering.
[16] Yuzhe Liu,et al. Cooperative Willingness Aware Collaborative Caching Mechanism Towards Cellular D2D Communication , 2018, IEEE Access.
[17] Yan Zhang,et al. Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.
[18] Mengjun Wang,et al. Automatic Modulation Classification Using Convolutional Neural Network With Features Fusion of SPWVD and BJD , 2019, IEEE Transactions on Signal and Information Processing over Networks.
[19] Zufan Zhang,et al. Social tie-driven content priority scheme for D2D communications , 2019, Inf. Sci..
[20] Tobias Distler,et al. Resource-Efficient Byzantine Fault Tolerance , 2016, IEEE Transactions on Computers.
[21] Zhiguang Qin,et al. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.
[22] Qiang Ye,et al. Performance Analysis of IEEE 802.15.6-Based Coexisting Mobile WBANs With Prioritized Traffic and Dynamic Interference , 2018, IEEE Transactions on Wireless Communications.
[23] Naohiro Hayashibara,et al. Energy Efficient Raft Consensus Algorithm , 2017, NBiS.
[24] Honggang Wang,et al. Security-oriented opportunistic data forwarding in Mobile Social Networks , 2017, Future Gener. Comput. Syst..