4.1 Article

The yoking-proof-based authentication protocol for cloud-assisted wearable devices

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Software Engineering

The Wearable Revolution

IEEE COMPUTER GRAPHICS AND APPLICATIONS (2015)

Article Engineering, Electrical & Electronic

PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems

Jun Zhou et al.

IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING (2015)

Editorial Material Computer Science, Information Systems

Social Access vs. Privacy in Wearable Computing: A Case Study of Autism

Reuben Kirkham et al.

IEEE PERVASIVE COMPUTING (2015)

Article Computer Science, Theory & Methods

Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing

Hong Liu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2015)

Article Computer Science, Theory & Methods

Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things

Huansheng Ning et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

SECURITY AND PRIVACY IN CLOUD-ASSISTED WIRELESS WEARABLE COMMUNICATIONS: CHALLENGES, SOLUTIONS AND, FUTURE DIRECTIONS

Jun Zhou et al.

IEEE WIRELESS COMMUNICATIONS (2015)

Article Computer Science, Hardware & Architecture

TOWARD SELF-AUTHENTICABLE WEARABLE DEVICES

Fidel Paniagua Diez et al.

IEEE WIRELESS COMMUNICATIONS (2015)

Article Computer Science, Hardware & Architecture

AIWAC: AFFECTIVE INTERACTION THROUGH WEARABLE COMPUTING AND CLOUD TECHNOLOGY

Min Chen et al.

IEEE WIRELESS COMMUNICATIONS (2015)

Article Computer Science, Hardware & Architecture

USER PRIVACY AND DATA TRUSTWORTHINESS IN MOBILE CROWD SENSING

Daojing He et al.

IEEE WIRELESS COMMUNICATIONS (2015)

Article Computer Science, Information Systems

IoT-enabled Web warehouse architecture: a secure approach

Rashid Mehmood et al.

PERSONAL AND UBIQUITOUS COMPUTING (2015)

Article Computer Science, Information Systems

EasyConnect: A Management System for IoT Devices and Its Applications for Interactive Design and Art

Yi-Bing Lin et al.

IEEE INTERNET OF THINGS JOURNAL (2015)

Article Computer Science, Information Systems

Mobile phones as medical devices in mental disorder treatment: an overview

Franz Gravenhorst et al.

PERSONAL AND UBIQUITOUS COMPUTING (2015)

Proceedings Paper Computer Science, Software Engineering

SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices

Rasib Khan et al.

2015 3RD IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2015) (2015)

Editorial Material Computer Science, Information Systems

The Internet of Things: connecting the world

Jesus Carretero et al.

PERSONAL AND UBIQUITOUS COMPUTING (2014)

Editorial Material Computer Science, Information Systems

Advances on data, information, and knowledge in the internet of things

Yunchuan Sun et al.

PERSONAL AND UBIQUITOUS COMPUTING (2014)

Article Engineering, Biomedical

MedMon: Securing Medical Devices Through Wireless Monitoring and Anomaly Detection

Meng Zhang et al.

IEEE TRANSACTIONS ON BIOMEDICAL CIRCUITS AND SYSTEMS (2013)

Article Computer Science, Theory & Methods

Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems

Hong Liu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Hardware & Architecture

Improving the Trustworthiness of Medical Device Software with Formal Verification Methods

Chunxiao Li et al.

IEEE EMBEDDED SYSTEMS LETTERS (2013)

Article Computer Science, Information Systems

Toward Secure and Dependable Storage Services in Cloud Computing

Cong Wang et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2012)