LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT
The use of the Internet of Things (IoT) in the electronic health (e-health) management
systems brings with it many challenges, including secure communications through insecure …
systems brings with it many challenges, including secure communications through insecure …
Online heart monitoring systems on the internet of health things environments: A survey, a reference model and an outlook
Abstract The Internet of Health Things promotes personalized and higher standards of care.
Its application is diverse and attracts the attention of a substantial section of the scientific …
Its application is diverse and attracts the attention of a substantial section of the scientific …
ECG signals-based security and steganography approaches in WBANs: A comprehensive survey and taxonomy
Abstract Wireless Body Area Networks (WBANs) are integral components of e-healthcare
systems, responsible for monitoring patients' physiological states through intelligent …
systems, responsible for monitoring patients' physiological states through intelligent …
A novel two-dimensional ECG feature extraction and classification algorithm based on convolution neural network for human authentication
A biometrics-based authentication system is usually a better security solution than traditional
systems which are heavily reliant on passwords, personal identification numbers or smart …
systems which are heavily reliant on passwords, personal identification numbers or smart …
RHS-TRNG: A resilient high-speed true random number generator based on STT-MTJ device
S Fu, T Li, C Zhang, H Li, S Ma, J Zhang… - … Transactions on Very …, 2023 - ieeexplore.ieee.org
High-quality random numbers are very critical to many fields such as cryptography, finance,
and scientific simulation, which calls for the design of reliable true random number …
and scientific simulation, which calls for the design of reliable true random number …
The Emerging Challenges of Wearable Biometric Cryptosystems
Cryptographic key generation and data encryption and decryption using wearable biometric
technologies is an emerging research area with significant potential for authentication and …
technologies is an emerging research area with significant potential for authentication and …
[HTML][HTML] KeyEncoder: A secure and usable EEG-based cryptographic key generation mechanism
Nowadays, a rapid, easy, and convenient access to our private information is essential to
carry out both personal and professional activities. In most cases, this information is …
carry out both personal and professional activities. In most cases, this information is …
Novel 1-D enhanced Log-logistic chaotic map and asymmetric generalized Gaussian apertured FrFT for image encryption
This paper proposes a 1-D enhanced Log-logistic chaotic map (1-DELLCM) and an
asymmetric generalized Gaussian apertured fractional Fourier transform (AGGAFrFT). The 1 …
asymmetric generalized Gaussian apertured fractional Fourier transform (AGGAFrFT). The 1 …
NFC-powered implantable device for on-body parameters monitoring with secure data exchange link to a medical blockchain type of network
BMG Rosa, S Anastasova… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Implantable devices represent the future of remote medical monitoring and administration of
both chemical and physical therapies to the patients. Although some of these devices are …
both chemical and physical therapies to the patients. Although some of these devices are …
Preliminary Study of Novel Bio-Crypto Key Generation Using Clustering-Based Binarization of ECG Features
In modern society, the popularity of wearable devices has highlighted the need for data
security. Bio-crypto keys (bio-keys), especially in the context of wearable devices, are …
security. Bio-crypto keys (bio-keys), especially in the context of wearable devices, are …