4.6 Article

IoT-RRHM: Provably secure IoT-based real-time remote healthcare monitoring framework

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

A secure three factor based authentication scheme for health care systems using IoT enabled devices

Shreeya Swagatika Sahoo et al.

Summary: The Internet of Things (IoT) has become popular due to the use of Internet-enabled devices, but security and privacy concerns remain due to the insecure sharing of information. To address this, mutual authentication between patients and medical servers is necessary to protect medical privacy and system reliability.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Information Systems

Secure-Anonymous User Authentication Scheme for e-Healthcare Application Using Wireless Medical Sensor Networks

Yoney Kirsal Ever

IEEE SYSTEMS JOURNAL (2019)

Article Computer Science, Information Systems

CasCP: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving

Yong Xie et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Article Health Care Sciences & Services

Analysis and Improvement of a Mutual Authentication Scheme for Wireless Body Area Networks

Rui Chen et al.

JOURNAL OF MEDICAL SYSTEMS (2019)

Article Engineering, Electrical & Electronic

A novel and efficient lattice-based authenticated key exchange protocol in C-K model

Daya Sagar Gupta et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2018)

Article Computer Science, Hardware & Architecture

An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks

Sravani Challa et al.

COMPUTERS & ELECTRICAL ENGINEERING (2018)

Article Health Care Sciences & Services

An Efficient Remote Authentication Scheme for Wireless Body Area Network

Anyembe Andrew Omala et al.

JOURNAL OF MEDICAL SYSTEMS (2017)

Article Computer Science, Software Engineering

A Secure Cloud Storage using ECC-Based Homomorphic Encryption

Daya Sagar Gupta et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2017)

Article Computer Science, Hardware & Architecture

Secure user authentication scheme for wireless healthcare sensor networks

Chia-Hui Liu et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Health Care Sciences & Services

Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks

Libing Wu et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Health Care Sciences & Services

A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth

Qi Jiang et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Computer Science, Information Systems

A Secure IoT-Based Healthcare System With Body Sensor Networks

Kuo-Hui Yeh

IEEE ACCESS (2016)

Article Health Care Sciences & Services

New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing

Chunzhi Wang et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Health Care Sciences & Services

A Novel User Authentication and Key Agreement Protocol for Accessing Multi-Medical Server Usable in TMIS

Ruhul Amin et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Computer Science, Information Systems

Recent Advances in Industrial Wireless Sensor Networks Toward Efficient Management in IoT

Zhengguo Sheng et al.

IEEE ACCESS (2015)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)