Smart home-based IoT for real-time and secure remote health monitoring of triage and priority system using body sensors: Multi-driven systematic review
Abstract The Internet of Things (IoT) has been identified in various applications across
different domains, such as in the healthcare sector. IoT has also been recognised for its …
different domains, such as in the healthcare sector. IoT has also been recognised for its …
Sensor-based mHealth authentication for real-time remote healthcare monitoring system: A multilayer systematic review
The new and groundbreaking real-time remote healthcare monitoring system on sensor-
based mobile health (mHealth) authentication in telemedicine has considerably bounded …
based mobile health (mHealth) authentication in telemedicine has considerably bounded …
Lightweight cryptographic algorithms for guessing attack protection in complex internet of things applications
As the world keeps advancing, the need for automated interconnected devices has started to
gain significance; to cater to the condition, a new concept Internet of Things (IoT) has been …
gain significance; to cater to the condition, a new concept Internet of Things (IoT) has been …
[PDF][PDF] Simple, efficient, highly secure, and multiple purposed method on data cryptography
Accepted: 3 January 2022 Some digital data circulated through various social media,
regardless of its nature, requires high-level protection and security for various reasons. In …
regardless of its nature, requires high-level protection and security for various reasons. In …
AES-128 based secure low power communication for LoRaWAN IoT environments
Currently, Internet of Things (IoT) as an essential infrastructure proposed for industries and
different applications has been popularly applied to different domains, such as healthcare …
different applications has been popularly applied to different domains, such as healthcare …
[PDF][PDF] Cryptography: a comparative analysis for modern techniques
Cryptography plays a vital role for ensuring secure communication between multiple entities.
In many contemporary studies, researchers contributed towards identifying best …
In many contemporary studies, researchers contributed towards identifying best …
[PDF][PDF] A survey and analysis of the image encryption methods
OF Mohammad, MSM Rahim… - International Journal of …, 2017 - academia.edu
At the present time, the protection of multimedia data has become a very important process
which can be achieved by encryption. Basically, so many different techniques have been …
which can be achieved by encryption. Basically, so many different techniques have been …
An IoT enabled secured clinical health care framework for diagnosis of heart diseases
N Raheja, AK Manocha - Biomedical Signal Processing and Control, 2023 - Elsevier
Abstract World Health Organization (WHO) estimated cardiovascular diseases (CVDs) is
main contributor to the death count globally. In addition, there are shortcomings of …
main contributor to the death count globally. In addition, there are shortcomings of …
Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication
The main objective of this study is to propose a novel verification secure framework for
patient authentication between an access point (patient enrolment device) and a node …
patient authentication between an access point (patient enrolment device) and a node …
Finger vein biometrics: taxonomy analysis, open challenges, future directions, and recommended solution for decentralised network architectures
A review is conducted to deeply analyse and map the research landscape of current
technologies in finger vein (FV) biometric authentication in medical systems into a coherent …
technologies in finger vein (FV) biometric authentication in medical systems into a coherent …