[图书][B] Evaluation of trust in the Internet of Things: models, mechanisms and applications

NB Truong - 2018 - search.proquest.com
In the blooming era of the Internet of Things (IoT), trust has become a vital factor for
provisioning reliable smart services without human intervention by reducing risk in …

Fitness First or Safety First? Examining Adverse Consequences of Privacy Seals in the Event of a Data Breach.

K Masuch, M Greve, S Trang - 2021 - scholarspace.manoa.hawaii.edu
Data breaches are increasing, and fitness trackers have proven to be an ideal target, as they
collect highly sensitive personal health data and are not governed by strict security …

Security and Privacy of IoT Devices for Aging in Place

N Khaemba, I Traoré, M Mamun - Artificial Intelligence for Cyber-Physical …, 2022 - Springer
The rising cost of elderly living and care facilities prompts for other solutions for the elderly
people where aging in place is one of the ways to solve this issue using emerging …

Sağlik Bilişim Teknolojileri ve Yeni Hukuksal Soru (N) Lar

E Küzeci - İnönü Üniversitesi Hukuk Fakültesi Dergisi, 2018 - dergipark.org.tr
Elektronik Sağlık ya da kısaca e-Sağlık olarak da nitelenebilecek sağlık bilişim teknolojileri,
yeni iletişim teknolojilerinin (Information Communication Technologies-ICTs) sağlık …

A Study on Systematic Firmware Security Analysis Method for IoT Devices

Y Kim, J Gim, S Kim - Journal of the Korea Institute of Information …, 2021 - koreascience.kr
IoT devices refer to embedded devices that can communicate with networks. Since there are
various types of IoT devices and they are widely used around us, in the event of an attack …

Vulnerability Analysis and Exploitation Attacks on Smart Wearable Devices

SA Khan, HR Bajwa, J Sundaram… - … on Advancement in …, 2024 - ieeexplore.ieee.org
Wearable devices are becoming more popular these days due to its unique features and its
effectiveness. The evolution of Internet of Things (IoT) that combined health care devices …

An efficient privacy-preserving incentive scheme without TTP in participatory sensing network

J Liu, X Li, R Sun, X Du… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Along with the development of wireless communication technology, a mass of mobile
devices are gaining stronger sensing capability, which brings a novel paradigm to light …

Tiek: Two-tier Authentication and Key Distribution for Wearable Devices

S Hylamia, W Yan, C Rohner… - … Conference on Wireless …, 2019 - ieeexplore.ieee.org
Wearable devices, such as implantable medical devices and smart wearables, are
becoming increasingly popular with applications that vary from casual activity monitoring to …

Muscle Activity‐Driven Green‐Oriented Random Number Generation Mechanism to Secure WBSN Wearable Device Communications

Y Cao, G Zhang, F Liu, I You, G Zheng… - Wireless …, 2018 - Wiley Online Library
Wireless body sensor networks (WBSNs) mostly consist of low‐cost sensor nodes and
implanted devices which generally have extremely limited capability of computations and …

Adoption of Medical Technology in Public Healthcare Sector: An Evidence from Developing Country

A Samad Dahri, AA Jalbani, SB Memon - Effective Public Administration …, 2022 - Springer
In Pakistan, the public health system has seen major changes over the past 50 years
regarding social and economic aspects. Since the 1990s, the provincial governments had …