Sowjanya et al., 2020 - Google Patents
Survey of symmetric and asymmetric key management schemes in the context of iot based healthcare systemSowjanya et al., 2020
- Document ID
- 5634422954319986066
- Author
- Sowjanya K
- Dasgupta M
- Publication year
- Publication venue
- 2020 First International Conference on Power, Control and Computing Technologies (ICPC2T)
External Links
Snippet
Internet of Things (IoT) based real-time health monitoring system gains the attention of the researchers as well as the business sectors. This service turns out to be a blessing to the patients as well as the health care professionals. However, without data security, the …
- 238000004891 communication 0 description 7
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khan et al. | A secure framework for authentication and encryption using improved ECC for IoT-based medical sensor data | |
Chiou et al. | Improvement of a privacy authentication scheme based on cloud for medical environment | |
Mahmood et al. | An enhanced anonymous identity‐based key agreement protocol for smart grid advanced metering infrastructure | |
Chatterjee et al. | An effective ECC‐based user access control scheme with attribute‐based encryption for wireless sensor networks | |
Barua et al. | ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing | |
Sowjanya et al. | A ciphertext-policy Attribute based encryption scheme for wireless body area networks based on ECC | |
Chen et al. | A privacy authentication scheme based on cloud for medical environment | |
Li et al. | Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors | |
Jiang et al. | A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth | |
Omala et al. | An efficient remote authentication scheme for wireless body area network | |
Li et al. | Traceable Ciphertext‐Policy Attribute‐Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud | |
Yang et al. | An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system | |
Aroosa et al. | Securing NDN‐Based Internet of Health Things through Cost‐Effective Signcryption Scheme | |
Tu et al. | A secure, efficient and verifiable multimedia data sharing scheme in fog networking system | |
Mahmood et al. | Distributed multiparty key management for efficient authentication in the internet of things | |
Junejo et al. | A Lightweight Attribute‐Based Security Scheme for Fog‐Enabled Cyber Physical Systems | |
Harbi et al. | Secure data transmission scheme based on elliptic curve cryptography for internet of things | |
Sowjanya et al. | Survey of symmetric and asymmetric key management schemes in the context of iot based healthcare system | |
Rabie et al. | A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs) | |
Noor et al. | Securing wireless body area network with efficient secure channel free and anonymous certificateless signcryption | |
Trivedi et al. | Secrecy aware key management scheme for Internet of Healthcare Things | |
Cagalaban et al. | Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption | |
Qin et al. | Flexible and lightweight access control for online healthcare social networks in the context of the internet of things | |
Chatterjee et al. | A robust lightweight ECC-based three-way authentication scheme for IoT in cloud | |
Maurya et al. | Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system |