[HTML][HTML] Barriers and facilitators that influence telemedicine-based, real-time, online consultation at patients' homes: systematic literature review
HKY Almathami, KT Win… - Journal of medical Internet …, 2020 - jmir.org
Background Health care providers are adopting information and communication
technologies (ICTs) to enhance their services. Telemedicine is one of the services that rely …
technologies (ICTs) to enhance their services. Telemedicine is one of the services that rely …
Design of secure user authenticated key management protocol for generic IoT networks
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical
applications including smart home, smart city, smart grid, industrial Internet, connected …
applications including smart home, smart city, smart grid, industrial Internet, connected …
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
In recent years, the Internet of Drones (IoD) has emerged as an important research topic in
the academy and industry because it has several potential applications ranging from the …
the academy and industry because it has several potential applications ranging from the …
Secure remote user authenticated key establishment protocol for smart home environment
The Information and Communication Technology (ICT) has been used in wide range of
applications, such as smart living, smart health and smart transportation. Among all these …
applications, such as smart living, smart health and smart transportation. Among all these …
Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Cloud centric authentication for wearable healthcare monitoring system
Security and privacy are the major concerns in cloud computing as users have limited
access on the stored data at the remote locations managed by different service providers …
access on the stored data at the remote locations managed by different service providers …
A secure biometrics-based multi-server authentication protocol using smart cards
Recently, in 2014, He and Wang proposed a robust and efficient multi-server authentication
scheme using biometrics-based smart card and elliptic curve cryptography (ECC). In this …
scheme using biometrics-based smart card and elliptic curve cryptography (ECC). In this …
Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things
The recent proliferation of mobile devices, such as smartphones and wearable devices has
given rise to crowdsourcing Internet of Things (IoT) applications. E-healthcare service is one …
given rise to crowdsourcing Internet of Things (IoT) applications. E-healthcare service is one …
Design of secure and lightweight authentication protocol for wearable devices environment
Wearable devices are used in various applications to collect information including step
information, sleeping cycles, workout statistics, and health-related information. Due to the …
information, sleeping cycles, workout statistics, and health-related information. Due to the …
A lightweight authentication scheme for 6G-IoT enabled maritime transport system
The Sixth-Generation (6G) mobile network has the potential to provide not only traditional
communication services but also additional processing, caching, sensing, and control …
communication services but also additional processing, caching, sensing, and control …