A secure real-time internet of medical smart things (IOMST)
Tài liệu tham khảo
Osseiran, 2017, Internet of things, IEEE Commun Stand Mag, 1, 84, 10.1109/MCOMSTD.2017.7992936
Zanella, 2014, Internet of things for smart cities, IEEE Int Things J, 1, 22, 10.1109/JIOT.2014.2306328
Bardram, 2011, Phase recognition during surgical procedures using embedded and body-worn sensors, 45
http://cloudtweaks.com/2013/05/top-5-hipaa-security-risks-asproviders-migrate-to-tthe-cloud/, may 2013 (Accessed: 5 july 2017).
https://www.forbes.com/sites/gilpress/2017/03/20/6-hot-internet-of-things-iot-security-technologies, Mar 2017(last access October 2017).
http://www.hhnmag.com/articles/3438-how-the-internet-of-things-will-affect-health-care, June 2015 (Accessed: 10 June 2017).
Maksimović, 2015, A custom internet of things healthcare system, 1
G. Zhou, P. Zeng, X. Yuan, S. Chen, and K-K.R. Choo, An efficient code-based threshold ring signature scheme with a leader-participate model, Secur Commun Netw, 2017 (Article ID 1915239), 1-7, Aug. 2017.
Lake, 2014, Internet of things: architectural framework for ehealth security, J ICT Stand, 1, 301, 10.13052/jicts2245-800X.133
https://www.owasp.org/index.php/Main_Page, 2017 (last access 2 November 2015).
Stergiou, 2018, Secure integration of IoT and cloud computing, Future Gener Comput Syst, 78, 964, 10.1016/j.future.2016.11.031
Feldhofer, 2004, Strong authentication for RFID systems using the AES algorithm, 357
M. Usman, I. Ahmed, M.I. Aslam, S. Khan, and U.A. Shah, “SIT: a lightweight encryption algorithm for secure internet of things,” arXivPrepr. arXiv1704.08688, 2017.
Elhoseny, 2016, An energy efficient encryption method for secure dynamic WSN, Secur Commun Netw, 9, 2024, 10.1002/sec.1459
Li, 2018, Differentially private Naive Bayes learning over multiple data sources, Inf Sci (Ny)., 444, 89, 10.1016/j.ins.2018.02.056
Gao, 2018, Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack, Inf Sci (Ny)., 444, 72, 10.1016/j.ins.2018.02.058
Gupta, 2016, Handbook of research on modern cryptographic solutions for computer and cyber security, IGI Global
Cui, 2017, Algebraic cryptanalysis scheme of AES-256 using Gröbner basis, Downloads.Hindawi.Com, 2017, 9
AlaaTharwat, Hani Mahdi, Mohamed Elhoseny, Aboul Ella hassanien, Recognizing human activity in mobile crowdsensing environment using optimized k-NN algorithm, Expert Syst Appl, Available online 12 April 2018 (https://doi.org/10.1016/j.eswa.2018.04.017).
Abdelaziza, 2018, A machine learning model for improving healthcare services on cloud computing environment”, Measurement, 119, 117, 10.1016/j.measurement.2018.01.022
Mohamed Elhoseny, Ahmed Abdelaziz, Ahmed Salama, AM Riad, Arun Kumar Sangaiah, Khan Muhammad, A hybrid model of internet of things and cloud computing to manage big data in health services applications, Future generation computer systems, Elsevier, Accepted March 2018, In Press.
Elhoseny, 2018, A framework for big data analysis in smart cities, 723