[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sowjanya et al., 2020 - Google Patents

Survey of symmetric and asymmetric key management schemes in the context of iot based healthcare system

Sowjanya et al., 2020

Document ID
5634422954319986066
Author
Sowjanya K
Dasgupta M
Publication year
Publication venue
2020 First International Conference on Power, Control and Computing Technologies (ICPC2T)

External Links

Snippet

Internet of Things (IoT) based real-time health monitoring system gains the attention of the researchers as well as the business sectors. This service turns out to be a blessing to the patients as well as the health care professionals. However, without data security, the …
Continue reading at ieeexplore.ieee.org (other versions)

Similar Documents

Publication Publication Date Title
Khan et al. A secure framework for authentication and encryption using improved ECC for IoT-based medical sensor data
Chiou et al. Improvement of a privacy authentication scheme based on cloud for medical environment
Mahmood et al. An enhanced anonymous identity‐based key agreement protocol for smart grid advanced metering infrastructure
Chatterjee et al. An effective ECC‐based user access control scheme with attribute‐based encryption for wireless sensor networks
Barua et al. ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing
Sowjanya et al. A ciphertext-policy Attribute based encryption scheme for wireless body area networks based on ECC
Chen et al. A privacy authentication scheme based on cloud for medical environment
Li et al. Secure and efficient anonymous authentication scheme for three-tier mobile healthcare systems with wearable sensors
Jiang et al. A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth
Omala et al. An efficient remote authentication scheme for wireless body area network
Li et al. Traceable Ciphertext‐Policy Attribute‐Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud
Yang et al. An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system
Aroosa et al. Securing NDN‐Based Internet of Health Things through Cost‐Effective Signcryption Scheme
Tu et al. A secure, efficient and verifiable multimedia data sharing scheme in fog networking system
Mahmood et al. Distributed multiparty key management for efficient authentication in the internet of things
Junejo et al. A Lightweight Attribute‐Based Security Scheme for Fog‐Enabled Cyber Physical Systems
Harbi et al. Secure data transmission scheme based on elliptic curve cryptography for internet of things
Sowjanya et al. Survey of symmetric and asymmetric key management schemes in the context of iot based healthcare system
Rabie et al. A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)
Noor et al. Securing wireless body area network with efficient secure channel free and anonymous certificateless signcryption
Trivedi et al. Secrecy aware key management scheme for Internet of Healthcare Things
Cagalaban et al. Towards a secure patient information access control in ubiquitous healthcare systems using identity-based signcryption
Qin et al. Flexible and lightweight access control for online healthcare social networks in the context of the internet of things
Chatterjee et al. A robust lightweight ECC-based three-way authentication scheme for IoT in cloud
Maurya et al. Collusion-resistant and privacy-preserving data sharing scheme on outsourced data in e-healthcare system