2015
DOI: 10.1007/s12083-015-0332-4
|View full text |Cite
|
Sign up to set email alerts
|

An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 87 publications
(40 citation statements)
references
References 28 publications
0
38
0
Order By: Relevance
“…In this technique, a finite number of iterations is used to get an optimal solution [3]- [5], [7], [8], [29]- [38]. In each iteration, inputs in the form of reinforcement signal are provided to take adaptive decisions about all the forthcoming actions.…”
Section: Background and Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…In this technique, a finite number of iterations is used to get an optimal solution [3]- [5], [7], [8], [29]- [38]. In each iteration, inputs in the form of reinforcement signal are provided to take adaptive decisions about all the forthcoming actions.…”
Section: Background and Preliminariesmentioning
confidence: 99%
“…. , a n } is a finite set containing the inputs received with respect to the actions taken by the players in the coalition game, π : S × R → S maps the current state/process and input from the environment to the next state of the state space, and G is used to map the current state and inputs to the finite state of the state space [3]- [5], [7], [8], [29]- [38]. As shown in Fig.…”
Section: Background and Preliminariesmentioning
confidence: 99%
“…The development of IoT technologies can support a variety of applications, including the intelligent power grid [1][2][3][4], intelligent transportation [5,6], intelligent medicine and healthcare [7][8][9][10], intelligent art [11,12], intelligent logistics [13,14], intelligent environmental monitoring [15,16], smart life [17][18][19][20], etc. In a smart home context, numerous smart objects need to use wireless communications due to the requirements of supporting mobile applications and maintaining neat living space.…”
Section: Open Accessmentioning
confidence: 99%
“…A bandwidth-aware task scheduling algorithm was proposed in [30] in which a non-linear programming model was formed which tried to minimize the total time needed to finish all the tasks. Kumar et al presented a RFID enabled Elliptic Curve Cryptography (ECC)-based authentication mechanism to enhance the security of healthcare application to provide medical services to the patients while traveling [31].…”
Section: Related Workmentioning
confidence: 99%