Securing the IoT-enabled smart healthcare system: A PUF-based resource-efficient authentication mechanism

O Alruwaili, M Tanveer, FM Alotaibi, W Abdelfattah… - Heliyon, 2024 - cell.com
Abstract As the Internet of Things (IoT) continues its rapid expansion, cloud computing has
become integral to various smart healthcare applications. However, the proliferation of …

A remote patient monitoring based on WBAN implementation with internet of thing and cloud server

JH Majeed, Q Aish - Bulletin of Electrical Engineering and Informatics, 2021 - beei.org
A healthcare employment is the mainly domain in emergent technology of WBAN, and an e-
health system created of cloud computing in addition to a WSN considers an important part …

RESDA: robust and efficient secure data aggregation scheme in healthcare using the IoT

BO Soufiene, AA Bahattab, A Trad… - … conference on internet …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) connects huge number of devices using the internet to collect
data. The IoT has a variety of application domains, including health care. In these scenarios …

IoHT System Authentication Through the Blockchain Technology: A Review

M Jawad, AA Yassin, HAA Al-Asadi… - … on Control, Decision …, 2024 - ieeexplore.ieee.org
The growing adoption of the Internet of Things (IoT) terminology in recent years in several
domains, including healthcare, has yielded multiple benefits. One of the roles is to support …

Design and implementation of smart E-health system based on cloud computing to monitor the vital signs in real-time and measurements validation

A Abd Ali, AH Ali, AJ Al-Askery - IOP Conference Series …, 2020 - iopscience.iop.org
Wearable devices used to monitor patients are classified as part of mobile health, one of the
branches of e-health. They are widely used to monitor the vital signs of patients outside of …

Comprehensive Challenges to E-government in Iraq

HK Abdali, MA Hussain, ZA Abduljabbar… - Computer Science On …, 2024 - Springer
In recent years, governments and commercial organizations all over the world have
endeavored to explore new searches, opportunities, and investments for making their …

A lightweight and robust authentication scheme for the healthcare system using public cloud server

IA Abbasi, SU Jan, AS Alqahtani, AS Khan, F Algarni - Plos one, 2024 - journals.plos.org
Cloud computing is vital in various applications, such as healthcare, transportation,
governance, and mobile computing. When using a public cloud server, it is mandatory to be …

Provably Efficient and Fast Technique for Determining the Size of a Brain Tumor in T1 MRI Images

AH Ali, HM Jasim, ZA Abduljabbar… - … in Information and …, 2024 - ieeexplore.ieee.org
This work proposes an efficient a nd effective technique for determining the size of
neoplasms in the brain using image processing. The cerebral hemispheres make up the …

Dynamic Searchable Scheme with Forward Privacy for Encrypted Document Similarity

MA Al Sibahee, C Luo, J Zhang… - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
Document retrieval plays an essential role in many real-world applications especially when
the data storage is outsourced. Due to the great advantages offered by cloud computing …

Internet of Things Protocols for Context-Aware Anonymity Authentication with an Emphasis on E-Health Applications

S Srivastava, S Gupta, A Gehlot, P Vijay… - … on Computing for …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) system improves existing healthcare systems and their data.
Specifically, the patient's sensitive data may be eavesdropped and linked to the identities of …