4.6 Article

An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps

Related references

Note: Only part of the references are listed.
Article Optics

Controlled alternate quantum walks based privacy preserving healthcare images in Internet of Things

Ahmed A. Abd EL-Latif et al.

OPTICS AND LASER TECHNOLOGY (2020)

Article Computer Science, Information Systems

ORCID: Opportunistic Reconnectivity for Network Management in the Presence of Dumb Nodes in Wireless Sensor Networks

Arijit Roy et al.

IEEE SYSTEMS JOURNAL (2020)

Article Computer Science, Information Systems

An efficient and provable certificate-based proxy signature scheme for IIoT environment

Girraj Kumar Verma et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption

Nestor Tsafack et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario

Ahmed A. Abd El-Latif et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2020)

Article Computer Science, Information Systems

Detection of myocardial infarction based on novel deep transfer learning methods for urban healthcare in smart cities

Ahmed Alghamdi et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Providing End-to-End Security Using Quantum Walks in IoT Networks

Ahmed A. Abd El-Latif et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things

Nestor Tsafack et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

DITrust Chain: Towards Blockchain-Based Trust Models for Sustainable Healthcare IoT Systems

Eman M. Abou-Nassar et al.

IEEE ACCESS (2020)

Article Computer Science, Artificial Intelligence

An efficient online/offline ID-based short signature procedure using extended chaotic maps

Chandrashekhar Meshram et al.

SOFT COMPUTING (2019)

Article Computer Science, Artificial Intelligence

An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem

Chandrashekhar Meshram et al.

SOFT COMPUTING (2019)

Article Computer Science, Information Systems

Score level multibiometrics fusion approach for healthcare

Ahmed A. Abd El-Latif et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems

Sanjay K. Dhurandher et al.

IEEE SYSTEMS JOURNAL (2018)

Article Computer Science, Artificial Intelligence

A secure key authentication scheme for cryptosystems based on GDLP and IFP

Chandrashekhar Meshram et al.

SOFT COMPUTING (2017)

Review Computer Science, Hardware & Architecture

A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems

Mohammad Masdari et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Information Systems

An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP

Chandrashekhar Meshram et al.

INFORMATICA (2017)

Article Computer Science, Interdisciplinary Applications

Secure anonymous mutual authentication for star two-tier wireless body area networks

Maged Hamada Ibrahim et al.

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2016)

Review Computer Science, Interdisciplinary Applications

Mobile-health: A review of current state in 2015

Bruno M. C. Silva et al.

JOURNAL OF BIOMEDICAL INFORMATICS (2015)

Article Computer Science, Theory & Methods

Certificateless Remote Anonymous Authentication Schemes for Wireless Body Area Networks

Jingwei Liu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2014)

Article Health Care Sciences & Services

An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem

Zhenguo Zhao

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Computer Science, Theory & Methods

SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

Rongxing Lu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Theory & Methods

Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption

Ming Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Hardware & Architecture

Securing m-healthcare social networks: challenges, countermeasures and future directions

Jun Zhou et al.

IEEE WIRELESS COMMUNICATIONS (2013)

Article Health Care Sciences & Services

An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps

Cheng-Chi Lee et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Mathematics, Applied

Period distribution analysis of some linear maps

Fei Chen et al.

COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2012)

Article Engineering, Electrical & Electronic

Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs

Rongxing Lu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2012)

Article Computer Science, Information Systems

An ID-based cryptographic mechanisms based on GDLP and IFP

Chandrashekhar Meshram et al.

INFORMATION PROCESSING LETTERS (2012)

Review Computer Science, Interdisciplinary Applications

Healthcare in the pocket: Mapping the space of mobile-phone health interventions

Predrag Klasnja et al.

JOURNAL OF BIOMEDICAL INFORMATICS (2012)

Article Computer Science, Hardware & Architecture

A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network

Rongxing Lu et al.

MOBILE NETWORKS & APPLICATIONS (2011)

Article Computer Science, Hardware & Architecture

OPPORTUNITIES IN OPPORTUNISTIC COMPUTING

Marco Conti et al.

COMPUTER (2010)

Article Engineering, Electrical & Electronic

From Opportunistic Networks to Opportunistic Computing

Marco Conti et al.

IEEE COMMUNICATIONS MAGAZINE (2010)

Article Computer Science, Theory & Methods

Cross-Domain Data Sharing in Distributed Electronic Health Record Systems

Jinyuan Sun et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2010)

Article Engineering, Electrical & Electronic

An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications

Rongxing Lu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2010)

Article Computer Science, Hardware & Architecture

DATA SECURITY AND PRIVACY IN WIRELESS BODY AREA NETWORKS

Ming Li et al.

IEEE WIRELESS COMMUNICATIONS (2010)

Article Computer Science, Hardware & Architecture

MONITORING PATIENTS VIA A SECURE AND MOBILE HEALTHCARE SYSTEM

Yonglin Ren et al.

IEEE WIRELESS COMMUNICATIONS (2010)

Article Computer Science, Information Systems

A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges

Xuefei Cao et al.

INFORMATION SCIENCES (2010)

Article Mathematics, Interdisciplinary Applications

Chaotic map based key agreement with/out clock synchronization

S. Han et al.

CHAOS SOLITONS & FRACTALS (2009)

Article Engineering, Electrical & Electronic

SAGE: A Strong Privacy-Preserving Scheme Against Global Eavesdropping for eHealth Systems

Xiaodong Lin et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2009)

Article Computer Science, Hardware & Architecture

ENABLING SECURE SERVICE DISCOVERY IN MOBILE HEALTHCARE ENTERPRISE NETWORKS

Alessandra Toninelli et al.

IEEE WIRELESS COMMUNICATIONS (2009)

Article Mathematics, Interdisciplinary Applications

Cryptanalysis of the public key encryption based on multiple chaotic systems

Linhua Zhang

CHAOS SOLITONS & FRACTALS (2008)

Article Computer Science, Interdisciplinary Applications

Statistical disclosure control architectures for patient records in biomedical information systems

M. Elliot et al.

JOURNAL OF BIOMEDICAL INFORMATICS (2008)

Article Health Care Sciences & Services

Wireless body sensor network using medical implant band

Mehmet R. Yuce et al.

JOURNAL OF MEDICAL SYSTEMS (2007)

Article Engineering, Electrical & Electronic

GSTS: A secure and privacy-preserving protocol for vehicular communications

Xiaodong Lin et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2007)

Article Engineering, Electrical & Electronic

Security of public-key cryptosystems based on Chebyshev polynomials

P Bergamo et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2005)

Article Computer Science, Interdisciplinary Applications

How (not) to protect genomic data privacy in a distributed network: using trail re-identification to evaluate and design anonymity protection systems

B Malin et al.

JOURNAL OF BIOMEDICAL INFORMATICS (2004)