An exhaustive survey on security and privacy issues in Healthcare 4.0

JJ Hathaliya, S Tanwar - Computer Communications, 2020 - Elsevier
The healthcare industry has revolutionized from 1.0 to 4.0 where Healthcare 1.0 was more
doctor centric and Healthcare 2.0 replaced manual records with electronic healthcare …

Cloud healthcare services: A comprehensive and systematic literature review

M Rahimi, NJ Navimipour… - Transactions on …, 2022 - Wiley Online Library
Over the last decade, the landscape of cloud computing has been significantly changed. It
has been known as a paradigm in which a shared pool of computing resources is accessible …

A security model based on lightgbm and transformer to protect healthcare systems from cyberattacks

A Ghourabi - IEEE Access, 2022 - ieeexplore.ieee.org
Cybersecurity incidents have become a growing problem for the healthcare industry since
the widespread introduction of technology into the healthcare systems. In recent years, the …

PSL-MAAKA: Provably secure and lightweight mutual authentication and key agreement protocol for fully public channels in internet of medical things

J Li, Z Su, D Guo, KKR Choo, Y Ji - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Designing efficient and secure mutual authentication and key agreement (MAAKA) protocols
for Internet of Medical Things (IoMT) has been shown to be challenging, mainly due to the …

[HTML][HTML] Security paradigm for remote health monitoring edge devices in internet of things

D Gupta, S Rani, S Raza, NMF Qureshi… - Journal of King Saud …, 2023 - Elsevier
The tremendous growth in the internet of things (IoT) technology has provided great support
for e-healthcare applications. The remote health monitoring of patients at home is gaining …

Multibiosignal chaotic encryption scheme based on spread spectrum and global diffusion process for e-health

MA Murillo-Escobar, C Cruz-Hernández… - … Signal Processing and …, 2022 - Elsevier
E-health provides several remote health services highly convenient for patients.
Nevertheless, inherent security risks are present in e-health such as data privacy since …

[PDF][PDF] Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing.

RF Abdel-Kader, SH El-Sherif, RY Rizk - International Journal of …, 2020 - academia.edu
Cloud computing environment requires secure access for data from the cloud server, small
execution time, and low time complexity. Existing traditional cryptography algorithms are not …

One to many (new scheme for symmetric cryptography)

AD Wowor, B Susanto - … Computing Electronics and Control), 2023 - telkomnika.uad.ac.id
Symmetric cryptography will always produce the same ciphertext if the plaintext and the
given key are the same repeatedly. This condition will make it easier for cryptanalysts to …

A Review on Cloud Cryptography Techniques to Improve Security in E-health Systems

AP Nirmala, A Christi - 2022 6th International Conference on …, 2022 - ieeexplore.ieee.org
In last few years there has been a rapid growth of innovation in Information Technology
which provided a better wellbeing and development in Health care system to adopt E-health …

Telehealth secure solution to provide childhood obesity monitoring

E Jiménez-García, MÁ Murillo-Escobar… - Sensors, 2022 - mdpi.com
Childhood obesity causes not only medical and psychosocial problems, it also reduces the
life expectancy of the adults that they will become. On a large scale, obese adults adversely …