Smart home-based IoT for real-time and secure remote health monitoring of triage and priority system using body sensors: Multi-driven systematic review

M Talal, AA Zaidan, BB Zaidan, AS Albahri… - Journal of medical …, 2019 - Springer
Abstract The Internet of Things (IoT) has been identified in various applications across
different domains, such as in the healthcare sector. IoT has also been recognised for its …

Sensor-based mHealth authentication for real-time remote healthcare monitoring system: A multilayer systematic review

ML Shuwandy, BB Zaidan, AA Zaidan… - Journal of medical …, 2019 - Springer
The new and groundbreaking real-time remote healthcare monitoring system on sensor-
based mobile health (mHealth) authentication in telemedicine has considerably bounded …

Lightweight cryptographic algorithms for guessing attack protection in complex internet of things applications

MK Hasan, M Shafiq, S Islam, B Pandey… - …, 2021 - Wiley Online Library
As the world keeps advancing, the need for automated interconnected devices has started to
gain significance; to cater to the condition, a new concept Internet of Things (IoT) has been …

[PDF][PDF] Simple, efficient, highly secure, and multiple purposed method on data cryptography

M Mua'ad, K Aldebei, ZA Alqadi - Traitement du Signal, 2022 - academia.edu
Accepted: 3 January 2022 Some digital data circulated through various social media,
regardless of its nature, requires high-level protection and security for various reasons. In …

AES-128 based secure low power communication for LoRaWAN IoT environments

KL Tsai, YL Huang, FY Leu, I You, YL Huang… - Ieee …, 2018 - ieeexplore.ieee.org
Currently, Internet of Things (IoT) as an essential infrastructure proposed for industries and
different applications has been popularly applied to different domains, such as healthcare …

[PDF][PDF] Cryptography: a comparative analysis for modern techniques

F Maqsood, M Ahmed, MM Ali… - International Journal of …, 2017 - pdfs.semanticscholar.org
Cryptography plays a vital role for ensuring secure communication between multiple entities.
In many contemporary studies, researchers contributed towards identifying best …

[PDF][PDF] A survey and analysis of the image encryption methods

OF Mohammad, MSM Rahim… - International Journal of …, 2017 - academia.edu
At the present time, the protection of multimedia data has become a very important process
which can be achieved by encryption. Basically, so many different techniques have been …

An IoT enabled secured clinical health care framework for diagnosis of heart diseases

N Raheja, AK Manocha - Biomedical Signal Processing and Control, 2023 - Elsevier
Abstract World Health Organization (WHO) estimated cardiovascular diseases (CVDs) is
main contributor to the death count globally. In addition, there are shortcomings of …

Based blockchain-PSO-AES techniques in finger vein biometrics: A novel verification secure framework for patient authentication

AH Mohsin, AA Zaidan, BB Zaidan, OS Albahri… - Computer Standards & …, 2019 - Elsevier
The main objective of this study is to propose a novel verification secure framework for
patient authentication between an access point (patient enrolment device) and a node …

Finger vein biometrics: taxonomy analysis, open challenges, future directions, and recommended solution for decentralised network architectures

AH Mohsin, AA Zaidan, BB Zaidan, OS Albahri… - Ieee …, 2020 - ieeexplore.ieee.org
A review is conducted to deeply analyse and map the research landscape of current
technologies in finger vein (FV) biometric authentication in medical systems into a coherent …