2011 Fourth International Symposium on Computational Intelligence and Design 2011
DOI: 10.1109/iscid.2011.52
|View full text |Cite
|
Sign up to set email alerts
|

Study and Design of the Safe HIS on the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…Xin Bai, et al, analyzed the public security techniques of the Internet of Things, including IOT-MW (Internet of Things-Middleware), encryption, decryption, secret key management, privacy homomorphism, and access control etc. especially the cryptograph query [8]. Biplob R. Ray, et al, analyzed scalable RFID security framework and protocol for supporting Internet of Things.…”
Section: Related Workmentioning
confidence: 99%
“…Xin Bai, et al, analyzed the public security techniques of the Internet of Things, including IOT-MW (Internet of Things-Middleware), encryption, decryption, secret key management, privacy homomorphism, and access control etc. especially the cryptograph query [8]. Biplob R. Ray, et al, analyzed scalable RFID security framework and protocol for supporting Internet of Things.…”
Section: Related Workmentioning
confidence: 99%
“…Xin Bai and Hongyan Yan analyzed design of the safe HIS (Hospital Information System) on the Internet of Things. They also studied the public security technologies of the Internet of Things, including IoT-MW (Internet of Things-Middleware), encryption, decryption, secret key management, privacy homomorphism, access control and cryptograph query [14]. Figure 2 depicts a concept of the network topology for the u-health system.…”
Section: Figue 1 Architecture Of Iot Based On Security Mechanismmentioning
confidence: 99%
“…Gluhak and van Kranenburg (2012) discussed how the pervasively deployed IOT can be integrated with new signal processing technologies to implement the decentralized governance. Bai and Yan (2011) adopted the IoT in their hospital information system with the capability of emergency response. Researchers argued that the function of IoT can even be expanded from post-disaster relief gradually mainly to early-warning.…”
Section: Iots For Data Acquisition In Erssmentioning
confidence: 99%