Resource-efficient authenticated data sharing mechanism for smart wearable systems
Recent technological developments in the wearable devices (WDs) and smartphones
enabled ubiquitous and always-on monitoring of the users' movements. WDs collect the …
enabled ubiquitous and always-on monitoring of the users' movements. WDs collect the …
Secure and authenticated data access and sharing model for smart wearable systems
Contrary to the public cloud storage services that impose users to accept the security
restrictions delivered by the service provider, users in the private cloud benefit from self …
restrictions delivered by the service provider, users in the private cloud benefit from self …
Cloud-assisted secure and cost-effective authenticated solution for remote wearable health monitoring system
Security and privacy are the leading solicitude in cloud computing since users have
restricted privilege on the data maintained by distinct service providers at remote locations …
restricted privilege on the data maintained by distinct service providers at remote locations …
Anonymous authenticated key agreement and group proof protocol for wearable computing
Y Guo, Z Zhang, Y Guo - IEEE Transactions on Mobile …, 2021 - ieeexplore.ieee.org
Wearable computing has been used in a wide range of applications. But wearable
computing often suffers from various security and privacy issues. To solve these issues …
computing often suffers from various security and privacy issues. To solve these issues …
EAKE-WC: Efficient and anonymous authenticated key exchange scheme for wearable computing
Wearable computing has shown tremendous potential to revolutionize and uplift the
standard of our lives. However, researchers and field experts have often noted several …
standard of our lives. However, researchers and field experts have often noted several …
Design of secure and lightweight authentication protocol for wearable devices environment
Wearable devices are used in various applications to collect information including step
information, sleeping cycles, workout statistics, and health-related information. Due to the …
information, sleeping cycles, workout statistics, and health-related information. Due to the …
A decentralised authentication and access control mechanism for medical wearable sensors data
M Abubakar, Z Jaroucheh, A Al Dubai… - … Conference on Omni …, 2021 - ieeexplore.ieee.org
Recent years have seen an increase in medical big data, which can be attributed to a
paradigm shift experienced in medical data sharing induced by the growth of medical …
paradigm shift experienced in medical data sharing induced by the growth of medical …
Selective disclosure and yoking-proof based privacy-preserving authentication scheme for cloud assisted wearable devices
Along with the development of user-centric wireless communications, wearable devices
appear to be popular for real-time collecting a user's private data to provide intelligent …
appear to be popular for real-time collecting a user's private data to provide intelligent …
Privacy and Security Awareness for Sensitive/Non-sensitive Data based Wearable Devices
In recent years, technological industry has made a large investment in the design of
wearable devices. Wearable devices are attractive to a variety of different age groups within …
wearable devices. Wearable devices are attractive to a variety of different age groups within …
Secure and lightweight authentication with key agreement for smart wearable systems
Nowadays, an increasing number of wearable devices (WDs) have been widely deployed in
smart wearable systems to collect health status measures and body information of users …
smart wearable systems to collect health status measures and body information of users …