Internet of things (iot): A vision, architectural elements, and future directions, Future Generation Computer Systems, vol.29, issue.7, pp.1645-1660, 2013. ,
Engineering iot healthcare applications: towards a semantic data driven sustainable architecture, pp.407-418, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-02383461
Sharing health big data for research -A design by use cases: the INSHARE platform approach, The 16th World Congress on Medical and Health Informatics, 2017. ,
Security standards: Technical safeguards, HIPAA Secur. Ser, vol.2, pp.1-17, 2007. ,
Security and privacy issues in implantable medical devices: A comprehensive survey, Journal of biomedical informatics, vol.55, pp.272-289, 2015. ,
Absence makes the heart grow fonder: New directions for implantable medical device security, Proceedings of the 3rd Conference on Hot Topics in Security, vol.5, pp.1-5, 2008. ,
Imdguard: Securing implantable medical devices with the external wearable guardian, 2011 Proceedings IEEE INFOCOM, pp.1862-1870, 2011. ,
Efficient and secure comparison for on-line auctions, pp.416-430, 2007. ,
Performance comparison of secure comparison protocols, 2009 20th International Workshop on Database and Expert Systems Application, pp.133-136, 2009. ,
Proxy re-encryption based on homomorphic encryption, Proceedings of the 33rd Annual Computer Security Applications Conference, pp.154-161, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-02066555
Algorithm as 183: An efficient and portable pseudo-random number generator, Journal of the Royal Statistical Society. Series C (Applied Statistics), vol.31, issue.2, pp.188-190, 1982. ,
Tables of linear congruential generators of different sizes and good lattice structure, Math. Comput, vol.68, issue.225, pp.249-260, 1999. ,
Practical covertly secure mpc for dishonest majority -or: Breaking the spdz limits, Computer Security -ESORICS 2013, pp.1-18, 2013. ,
A length-flexible threshold cryptosystem with applications, pp.350-364, 2003. ,