References
- S. M. R. Islam, D. Kwak, M. Kabir, M. Hossain &. Kwak. (2015). The Internet of Things for Health Care: A Comprehensive Survey. IEEE Access, 3, 678-708. https://doi.org/10.1109/ACCESS.2015.2437951
- L. Catarinucci, D. de Donno, L. Mainetti, L. Palano, L. Patrono, M. L. Stefanizzi & L. Tarricone. (2015). An IoT-Aware Architecture for Smart Healthcare Systems. IEEE Internet of Things Journal, 2(6), 515-526. https://doi.org/10.1109/JIOT.2015.2417684
- S. K. Datta, C. Bonnet, A. Gyrard, R. P. Ferreira da Costa & K. Boudaoud. (2015). Applying Internet of Things for personalized healthcare in smart homes, WOCC, 164-169.
- H. Samani & R. Zhu. (2016). Robotic Automated External Defibrillator Ambulance for Emergency Medical Service in Smart Cities. IEEE Access, 4, 268-283. https://doi.org/10.1109/ACCESS.2016.2514263
- J. J. Yang, J. Q. Li & Y. Niu. (2015). A hybrid solution for privacy preserving medical data sharing in the cloud environment. Future Generation Computer Systems, 43(44), 74-86.
- X. B. Li & L. Z. Lu. (2015). General Construction Method of Multilength Optical Orthogonal Codes With Arbitrary Cross-Correlation Constraint for OCDMA Multimedia Network. Journal of Optical Communications and Networking, 7(3), 156-163. https://doi.org/10.1364/JOCN.7.000156
- J. G. Ko., C. Lu., M. B. Srivastava., J. A. Stankovic., A. Terzis. & M. Welsh. (2010). Wireless sensor networks for healthcare. Proceedings of the IEEE, 98(11), 1947-1960. https://doi.org/10.1109/JPROC.2010.2065210
- S. C. Rathi & I. Technology. (2012) Medical Image Authentication through Watermarking Preserving ROI. Health Information - An International Journal, 2, 292-295.
- G. Virone., A, Wood. L. Selavo., Q. Cao., L. Fang., T. Doan. & J. A. Stankovic. (2006). An Advanced Wireless Sensor Network for Health Monitoring. Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare (D2H2), 2-5.
- M. AI Ameen., J. Liu & K. Kwak. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of Medical Systems, 36(1), 93-101. https://doi.org/10.1007/s10916-010-9449-4
- T. Yang, D. Mu, W. Hu & H. Zhang. (2014). Energy-efficient border intrusion detection using wireless sensors network. EURASIP Journal on Wireless Communications and Networking, 1, 46.
- D. Liu, T. Song & Y. Dai. (2005). Isomorphism and generation of Montgomery-form elliptic curves suitable for cryptosystems. Tsinghua Science and Technology, 10(2), 145-151. https://doi.org/10.1016/S1007-0214(05)70046-8
- R. Fan, D. J. He, X. Z. Pan & L. D. Ping. (2011). An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks. Journal of Zhejiang University-Science C-Computers & Electronics, 12(7), 550-560. https://doi.org/10.1631/jzus.C1000377
- N. Gonzalez, C. Miers, F. Redigolo, T. Carvalho., M. Simplicio, M. Naslund & M. Pourzandi. (2011). A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing. 2011 IEEE Third International Conference on Cloud Computing Technology and Science, 231-238.
- G. Garkoti, S. K. Peddoju & R. Balasubramanian. (2014). Detection of insider attacks in cloud based e-healthcare environment. Proceedings - 2014 13th International Conference on Information Technology( ICIT 2014), 195-200.
- Q. A. Kester, L. Nana, A. C. Pascu, S. Gire, J. M. Eghan & N. N. Quaynor. (2015). A Security Technique for Authentication and Security of Medical Images in Health Information Systems. Proceedings - 15th International Conference on Computational Science and Its Applications(ICCSA 2015), 8-13.