Internet of Things for e-Health: An approach to medical applications, 2015 International Workshop on Computational Intelligence for Multimedia Understanding (IWCIM), pp.1-5, 2015. ,
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, pp.985-997, 2013. ,
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), 2016. ,
Security Models and Requirements for Healthcare Application Clouds, 2010 IEEE 3rd International Conference on Cloud Computing, pp.268-275, 2010. ,
Policy Privacy in Cryptographic Access Control, Computer Security Foundations Symposium (CSF), pp.46-60, 2015. ,
On the security of public key protocols, IEEE Transactions on Information Theory, vol.29, issue.2, pp.198-208, 1983. ,
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings," in Security and Privacy in Communication Networks, pp.89-106, 2010. ,
On the Integration of Cloud Computing and Internet of Things, 2014 International Conference on Future Internet of Things and Cloud, 2014. ,
A Medical Healthcare System for Privacy Protection Based on IoT, p.2015 ,
, Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), pp.217-222, 2015.
A Lightweight Authentication Scheme for E-Health Applications in the Context of Internet of Things, 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies, pp.90-95, 2015. ,
Securely Outsourcing Attribute-Based Encryption with Checkability, IEEE Transactions on Parallel and Distributed Systems, vol.25, issue.8, 2014. ,
Instantaneous proxy-based key update for cp-abe, 2016 IEEE 41st Conference on Local Computer Networks (LCN), pp.591-594, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01353898
Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things, vol.5, p.950, 2017. ,
Emerging Security Mechanisms for Medical Cyber Physical Systems, IEEE/ACM transactions on computational biology and bioinformatics, vol.13, pp.401-416, 2016. ,
Security Strength of RSA and Attribute Based Encryption for Data Security in Cloud Computing, International Journal of Innovative Research in Computer and Communication Engineering, 2014. ,
CP-ABE With Constant-Size Keys for Lightweight Devices, IEEE Transactions on Information Forensics and Security, vol.9, issue.5, pp.763-771, 2014. ,
Attribute-based Encryption for Fine-grained Access Control of Encrypted Data, Proceedings of the 13th ACM Conference on Computer and Communications Security, ser. CCS '06, pp.89-98, 2006. ,
Recommendation for Key Management, Part 1: General, 2016. ,
Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT, 2014 IEEE International Conference on Communications (ICC), pp.725-730, 2014. ,
On the Feasibility of Attribute-Based Encryption on Smartphone Devices, Proceedings of the 2015 Workshop on IoT Challenges in Mobile and Industrial Systems, pp.49-54, 2015. ,
Survey on secure communication protocols for the Internet of Things, Ad Hoc Networks, vol.32, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01272046
, The AVISPA Project
, PBC library -pairing-based cryptography
, Small portable AES128/192/256 in c
Ciphertext-Policy Attribute-Based Encryption, Proceedings of the 2007 IEEE Symposium on Security and Privacy, ser. SP '07, pp.321-334, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-01788815
Exploring formal strategy framework for the security in IoT towards e-health context using computational intelgence," in Internet of Things and Big Data Technologies for Next Generation Healthcare, ser. Studies in Big Data, pp.63-90, 2017. ,