http://iet.metastore.ingenta.com
1887

access icon openaccess Secured remote health monitoring system

  • XML
    49.4521484375Kb
  • HTML
    43.7958984375Kb
  • PDF
    195.46875Kb
Loading full text...

Full text loading...

/deliver/fulltext/htl/4/6/HTL.2017.0033.html;jsessionid=x9b3mfa9mrcb.x-iet-live-01?itemId=%2fcontent%2fjournals%2f10.1049%2fhtl.2017.0033&mimeType=html&fmt=ahah

References

    1. 1)
    2. 2)
    3. 3)
    4. 4)
    5. 5)
      • D. He , S. Chan , S. Tang .
        5. He, D., Chan, S., Tang, S.: ‘A novel and lightweight system to secure wireless medical sensor networks’, IEEE J. Biomed. Health Inf., 2014, 18, (1), pp. 2332.
        . IEEE J. Biomed. Health Inf. , 1 , 23 - 32
    6. 6)
    7. 7)
    8. 8)
    9. 9)
    10. 10)
      • C. Hu , H. Li , H. Cheng .
        10. Hu, C., Li, H., Cheng, H., et al: ‘Secure and efficient data communication protocol for wireless body area networks’, IEEE Trans. Multi-Scale Comput. Syst., 2015, 11, (14), pp. 111.
        . IEEE Trans. Multi-Scale Comput. Syst. , 14 , 1 - 11
    11. 11)
      • D. Feng . (2007)
        11. Feng, D.: ‘Biomedical information technology’ (Academic Press, 2007, 1st edn.).
        .
    12. 12)
      • K. Aggarwal , J.K. Saini , H.K. Verma .
        12. Aggarwal, K., Saini, J.K., Verma, H.K.: ‘Performance evaluation of RC6, blowfish, DES, IDEA, CAST-128 block ciphers’, Int. J. Comput. Appl., 2013, 68, (25), pp. 1016.
        . Int. J. Comput. Appl. , 25 , 10 - 16
    13. 13)
      • R. Masram , V. Shahare , J. Abraham .
        13. Masram, R., Shahare, V., Abraham, J., et al: ‘Analysis and comparison of symmetric key cryptographic algorithms based on various file features’, Int. J. Netw. Secur. Appl. (IJNSA), 2014, 6, (4), pp. 4352.
        . Int. J. Netw. Secur. Appl. (IJNSA) , 4 , 43 - 52
    14. 14)
    15. 15)
      • B. Schneier . (1996)
        15. Schneier, B.: ‘Applied cryptography’ (John Wiley & Sons, 1996, 2nd edn.).
        .
    16. 16)
      • Z. Qiao , S. Liang , S. Davis .
        16. Qiao, Z., Liang, S., Davis, S., et al: ‘Survey of attribute based encryption’, IEEE Explore, 2014, 00, pp. 16, doi. 10.1109/SNPD.2014.6888687.
        . IEEE Explore , 1 - 6
    17. 17)
      • S. Hohenberger , B. Waters .
        17. Hohenberger, S., Waters, B.: ‘Attribute-based encryption with fast decryption’. Public-Key Cryptography – PKC, 2013 (LNCS, 7778), pp. 162179.
        . Public-Key Cryptography – PKC , 162 - 179
http://iet.metastore.ingenta.com/content/journals/10.1049/htl.2017.0033
Loading

Related content

content/journals/10.1049/htl.2017.0033
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address