Related references
Note: Only part of the references are listed.Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice
Achilleas Papageorgiou et al.
IEEE ACCESS (2018)
A Fog-Based Healthcare Framework for Chikungunya
Sandeep K. Sood et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Usinga Fog Computing Facility With Pairing-Based Cryptography
Hadeal Abdulaziz Al Hamid et al.
IEEE ACCESS (2017)
Application of an Emergency Alarm System for Physiological Sensors Utilizing Smart Devices
James Kang et al.
TECHNOLOGIES (2017)
Security, privacy and trust in Internet of Things: The road ahead
S. Sicari et al.
COMPUTER NETWORKS (2015)
Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques
Michael Spreitzenbarth et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)
FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps
Steven Arzt et al.
ACM SIGPLAN NOTICES (2014)
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
William Enck et al.
ACM TRANSACTIONS ON COMPUTER SYSTEMS (2014)
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks
Xiaojiang Du et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)
Security in wireless sensor networks
Xiaojiang Du et al.
IEEE WIRELESS COMMUNICATIONS (2008)
Internet protocol television (IPTV): The killer application for the next-generation Internet
Yang Xiao et al.
IEEE COMMUNICATIONS MAGAZINE (2007)
A survey of key management schemes in wireless sensor networks
Yang Xiao et al.
COMPUTER COMMUNICATIONS (2007)
An effective key management scheme for heterogeneous sensor networks
Xiaojiang Du et al.
AD HOC NETWORKS (2007)