Related references
Note: Only part of the references are listed.Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system
Jian Xu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Cloud Centric Authentication for Wearable Healthcare Monitoring System
Srinivas Jangirala et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)
A Fast CP-ABE System for Cyber-Physical Security and Privacy in Mobile Healthcare Network
Shulan Wang et al.
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS (2020)
Secured Data Collection With Hardware-Based Ciphers for IoT-Based Healthcare
Hai Tao et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
A lightweight anonymous user authentication and key establishment scheme for wearable devices
Ankur Gupta et al.
COMPUTER NETWORKS (2019)
AI in Healthcare: Ethical and Privacy Challenges
Ivana Bartoletti
ARTIFICIAL INTELLIGENCE IN MEDICINE, AIME 2019 (2019)
Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things
Sandip Roy et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
Context-Sensitive Access in Industrial Internet of Things (IIoT) Healthcare Applications
Fadi Al-Turjman et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid
Lingjuan Lyu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
Ashok Kumar Das et al.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2018)
Incognito: A Method for Obfuscating Web Data
Rahat Masood et al.
WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018) (2018)
Next-Generation Big Data Analytics: State of the Art, Challenges, and Future Research Topics
Zhihan Lv et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
Xiong Li et al.
COMPUTER NETWORKS (2017)
End-to-end security scheme for mobility enabled healthcare Internet of Things
Sanaz Rahimi Moosavi et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope et al.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2016)
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
Chin-Chen Chang et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)
Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks
Jingwei Liu et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)
The random oracle methodology, revisited
R Canetti et al.
JOURNAL OF THE ACM (2004)