Related references
Note: Only part of the references are listed.Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System
Haiping Huang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)
Computation Partitioning for Mobile Cloud Computing in a Big Data Environment
Jianqiang Li et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)
Searchable Symmetric Encryption: Designs and Challe
Geong Sen Poh et al.
ACM COMPUTING SURVEYS (2017)
Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner
Lu Zhou et al.
COMPUTERS & SECURITY (2017)
Secure and controllable k-NN query over encrypted cloud data with key confidentiality
Youwen Zhu et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2016)
Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services
Boyi Xu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)
A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor, and Intelligent Medicine Box
Geng Yang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)
Model-Driven Safety Analysis of Closed-Loop Medical Systems
Miroslav Pajic et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)
Searchable symmetric encryption: Improved definitions and efficient constructions
Reza Curtmola et al.
JOURNAL OF COMPUTER SECURITY (2011)
iDistance:: An adaptive B+-tree based indexing method for nearest neighbor search
HV Jagadish et al.
ACM TRANSACTIONS ON DATABASE SYSTEMS (2005)