Reliable and resilient AI and IoT-based personalised healthcare services: A survey

N Taimoor, S Rehman - IEEE Access, 2021 - ieeexplore.ieee.org
Recent technological (eg, IoT, 5G), and economic (eg, UN 2030 Sustainable Development
Goals) developments have transformed the healthcare sector towards more personalized …

A provably secure three‐factor authentication protocol for wireless sensor networks

TY Wu, L Yang, Z Lee, SC Chu… - Wireless …, 2021 - Wiley Online Library
The wireless sensor network is a network composed of sensor nodes self‐organizing
through the application of wireless communication technology. The application of wireless …

Machine Learning based Diabetes Prediction using with AWS cloud

M Omkar, K Nimala - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
ML has contributed towards opening up new frontiers in several sectors including health and
medical facilities. Multiple ML approaches has been designed and developed to execute …

How to design authenticated key exchange for wearable devices: cryptanalysis of AKE for health monitoring and countermeasures via distinct sms with key split and …

Ł Krzywiecki, H Salin - … Conference on Cryptology and Network Security, 2022 - Springer
We provide a cryptanalysis of a certain type of an authenticated key exchange protocol
(AKE) for wearable devices. Subsequently, we propose a secure construction based on a …

LSNCP: Lightweight and Secure Numeric Comparison Protocol for Wireless Body Area Networks

H Yin, X Huang, B Xing, J Huang, X Sun… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Wireless body area networks (WBANs) have been deployed in numerous applications,
where the most common communication technology is Bluetooth. Bluetooth uses the …

Enhancing the security of numeric comparison secure simple pairing in Bluetooth 5.0

D Hou, J Zhang, KL Man - … on Trust, Security and Privacy in …, 2020 - ieeexplore.ieee.org
Bluetooth wireless technology is widely deployed in consumer electronics such as mobile
phones, headsets, medical wearables and so on. Security is a significant concern of users …

[PDF][PDF] A Chronological Review of Key Establishment Models and Protocols.

EYY Yap, JJ Chin, A Goh - Malaysian Journal of Mathematical …, 2021 - einspem.upm.edu.my
This work is a review on existing authenticated key exchange (AKE) security models and
protocols mainly based on Diffie-Hellman Key Exchange (DHKE). We provide a discussion …

Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments

Ł Krzywiecki, H Salin - … on Trust, Security and Privacy in …, 2022 - ieeexplore.ieee.org
A Circuit Breaking Environment (CBE) for Connected Railway Infrastructures (CRI) requires
that high sensitive cargos are bound to the transportation train carriges. This implies a …