[HTML][HTML] A survey of authentication in internet of things-enabled healthcare systems
The Internet of medical things (IoMT) provides an ecosystem in which to connect humans,
devices, sensors, and systems and improve healthcare services through modern …
devices, sensors, and systems and improve healthcare services through modern …
Secure patient authentication framework in the healthcare system using wireless medical sensor networks
Biosensor is a means to transmit some physical phenomena, like body temperature, pulse,
respiratory rate, electroencephalogram (EEG), electrocardiogram (ECG), and blood …
respiratory rate, electroencephalogram (EEG), electrocardiogram (ECG), and blood …
Improvement of a privacy authentication scheme based on cloud for medical environment
SY Chiou, Z Ying, J Liu - Journal of medical systems, 2016 - Springer
Medical systems allow patients to receive care at different hospitals. However, this entails
considerable inconvenience through the need to transport patients and their medical …
considerable inconvenience through the need to transport patients and their medical …
A privacy authentication scheme based on cloud for medical environment
With the rapid development of the information technology, the health care technologies
already became matured. Such as electronic medical records that can be easily stored …
already became matured. Such as electronic medical records that can be easily stored …
[HTML][HTML] Securing access to internet of medical things using a graphical-password-based user authentication scheme
Digital healthcare services have seen significant growth in this decade and many new
technologies have been thoroughly examined to provide efficient services through secure …
technologies have been thoroughly examined to provide efficient services through secure …
Cloud computing in healthcare-a vision, challenges and future directions
BE Narkhede, RD Raut… - … Journal of Business …, 2020 - inderscienceonline.com
In the era of cloud computing (CC), many organisations have successfully adopted and
leveraged CC capabilities to improve their business performance and economic …
leveraged CC capabilities to improve their business performance and economic …
[PDF][PDF] Transcription of out-of-vocabulary words in large vocabulary speech recognition based on phoneme-to-grapheme conversion
B Decadt, J Duchateau, W Daelemans… - IEEE …, 2002 - lirias.kuleuven.be
In this paper, we describe a method to enhance the readability of the textual output in a large
vocabulary continuous speech recognizer when out-of-vocabulary words occur. The basic …
vocabulary continuous speech recognizer when out-of-vocabulary words occur. The basic …
Multi-key searchable encryption with designated server
Y Zhou, H Guo, F Wang, W Luo - Intelligent Automation & Soft …, 2016 - Taylor & Francis
This paper presents a novel multi-key searchable encryption with designated server based
on the RA Popa's multi-key searchable encryption and Rhee's PEKS. As far as we know, it is …
on the RA Popa's multi-key searchable encryption and Rhee's PEKS. As far as we know, it is …
Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security
Openness has been added to IPTV (Internet Protocol Television) services in order for users
not only to receive, but also to provide them. Open IPTV is expected to bring about great …
not only to receive, but also to provide them. Open IPTV is expected to bring about great …
Design and analysis of an ID-updated mutual authentication protocol for mobile RFID system
Y Xu, J Yuan - Photonic Network Communications, 2019 - Springer
With comprehensive applications of radio-frequency identification (RFID) technology in
Internet of things, more and more mobile reader devices are utilized. However, in mobile …
Internet of things, more and more mobile reader devices are utilized. However, in mobile …