1 |
R. Fan, D. J. He, X. Z. Pan & L. D. Ping. (2011). An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. Journal of Zhejiang University-Science C-Computers & Electronics, 12(7), 550-560.
DOI
|
2 |
N. Gonzalez, C. Miers, F. Redigolo, T. Carvalho., M. Simplicio, M. Naslund & M. Pourzandi. (2011). A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing. 2011 IEEE Third International Conference on Cloud Computing Technology and Science, 231-238.
|
3 |
G. Garkoti, S. K. Peddoju & R. Balasubramanian. (2014). Detection of insider attacks in cloud based e-healthcare environment. Proceedings - 2014 13th International Conference on Information Technology( ICIT 2014), 195-200.
|
4 |
Q. A. Kester, L. Nana, A. C. Pascu, S. Gire, J. M. Eghan & N. N. Quaynor. (2015). A Security Technique for Authentication and Security of Medical Images in Health Information Systems. Proceedings - 15th International Conference on Computational Science and Its Applications(ICCSA 2015), 8-13.
|
5 |
J. J. Yang, J. Q. Li & Y. Niu. (2015). A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems, 43(44), 74-86.
|
6 |
X. B. Li & L. Z. Lu. (2015). General Construction Method of Multilength Optical Orthogonal Codes With Arbitrary Cross-Correlation Constraint for OCDMA Multimedia Network. Journal of Optical Communications and Networking, 7(3), 156-163.
DOI
|
7 |
J. G. Ko., C. Lu., M. B. Srivastava., J. A. Stankovic., A. Terzis. & M. Welsh. (2010). Wireless sensor networks for healthcare. Proceedings of the IEEE, 98(11), 1947-1960.
DOI
|
8 |
S. C. Rathi & I. Technology. (2012) Medical Image Authentication through Watermarking Preserving ROI. Health Information - An International Journal, 2, 292-295.
|
9 |
G. Virone., A, Wood. L. Selavo., Q. Cao., L. Fang., T. Doan. & J. A. Stankovic. (2006). An Advanced Wireless Sensor Network for Health Monitoring. Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare (D2H2), 2-5.
|
10 |
M. AI Ameen., J. Liu & K. Kwak. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93-101.
DOI
|
11 |
D. Liu, T. Song & Y. Dai. (2005). Isomorphism and generation of Montgomery-form elliptic curves suitable for cryptosystems. Tsinghua Science and Technology, 10(2), 145-151.
DOI
|
12 |
S. M. R. Islam, D. Kwak, M. Kabir, M. Hossain &. Kwak. (2015). The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access, 3, 678-708.
DOI
|
13 |
L. Catarinucci, D. de Donno, L. Mainetti, L. Palano, L. Patrono, M. L. Stefanizzi & L. Tarricone. (2015). An IoT-Aware Architecture for Smart Healthcare Systems. IEEE Internet of Things Journal, 2(6), 515-526.
DOI
|
14 |
S. K. Datta, C. Bonnet, A. Gyrard, R. P. Ferreira da Costa & K. Boudaoud. (2015). Applying Internet of Things for personalized healthcare in smart homes, WOCC, 164-169.
|
15 |
T. Yang, D. Mu, W. Hu & H. Zhang. (2014). Energy-efficient border intrusion detection using wireless sensors network. EURASIP Journal on Wireless Communications and Networking, 1, 46.
|
16 |
H. Samani & R. Zhu. (2016). Robotic Automated External Defibrillator Ambulance for Emergency Medical Service in Smart Cities. IEEE Access, 4, 268-283.
DOI
|