J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, Internet of things (iot): A vision, architectural elements, and future directions, Future Generation Computer Systems, vol.29, issue.7, pp.1645-1660, 2013.

R. Zgheib, E. Conchon, and R. Bastide, Engineering iot healthcare applications: towards a semantic data driven sustainable architecture, pp.407-418, 2017.
URL : https://hal.archives-ouvertes.fr/hal-02383461

G. Bouzillé, Sharing health big data for research -A design by use cases: the INSHARE platform approach, The 16th World Congress on Medical and Health Informatics, 2017.

C. Medicare and M. Services, Security standards: Technical safeguards, HIPAA Secur. Ser, vol.2, pp.1-17, 2007.

C. Camara, P. Peris-lopez, and J. E. Tapiador, Security and privacy issues in implantable medical devices: A comprehensive survey, Journal of biomedical informatics, vol.55, pp.272-289, 2015.

T. Denning, K. Fu, and T. Kohno, Absence makes the heart grow fonder: New directions for implantable medical device security, Proceedings of the 3rd Conference on Hot Topics in Security, vol.5, pp.1-5, 2008.

F. Xu, Z. Qin, C. C. Tan, B. Wang, and Q. Li, Imdguard: Securing implantable medical devices with the external wearable guardian, 2011 Proceedings IEEE INFOCOM, pp.1862-1870, 2011.

I. Damgård, M. Geisler, and M. Krøigaard, Efficient and secure comparison for on-line auctions, pp.416-430, 2007.

F. Kerschbaum, D. Biswas, and S. D. Hoogh, Performance comparison of secure comparison protocols, 2009 20th International Workshop on Database and Expert Systems Application, pp.133-136, 2009.

R. Bellafqira, G. Coatrieux, D. Bouslimi, G. Quellec, and M. Cozic, Proxy re-encryption based on homomorphic encryption, Proceedings of the 33rd Annual Computer Security Applications Conference, pp.154-161, 2017.
URL : https://hal.archives-ouvertes.fr/hal-02066555

B. A. Wichmann and I. D. Hill, Algorithm as 183: An efficient and portable pseudo-random number generator, Journal of the Royal Statistical Society. Series C (Applied Statistics), vol.31, issue.2, pp.188-190, 1982.

P. Ecuyer, Tables of linear congruential generators of different sizes and good lattice structure, Math. Comput, vol.68, issue.225, pp.249-260, 1999.

I. Damgård, M. Keller, E. Larraia, V. Pastro, P. Scholl et al., Practical covertly secure mpc for dishonest majority -or: Breaking the spdz limits, Computer Security -ESORICS 2013, pp.1-18, 2013.

I. Damgård and M. Jurik, A length-flexible threshold cryptosystem with applications, pp.350-364, 2003.