Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Medical services
biblio
A New Cryptography Algorithm to Protect Cloud-Based Healthcare Services
Submitted by grigby1 on Tue, 01/23/2018 - 1:54pm
patient treatment
hybrid real-time cryptography algorithm
innovative technology
lightweight wearable medical devices
Medical services
medical treatment
Metrics
patient confidentiality
patient monitoring
Human behavior
privacy
pubcrawl
real-time health monitoring
remote health monitoring system
Resiliency
secure cryptography algorithm
smart wearable medical devices
Data protection
bioinformatics
biomedical equipment
chaos
Cloud Computing
cloud-based healthcare service protection
computerised monitoring
contemporary health care management
Cryptography
Algorithm design and analysis
deterministic chaos method
DNA
DNA cryptography
genomic encryptions
genomics
health activities
health care
biblio
Advanced biometric home security system using digital signature and DNA cryptography
Submitted by grigby1 on Tue, 01/23/2018 - 1:53pm
home automation
Technological innovation
smart cards
Smart card
Resiliency
pubcrawl
privacy
multifeature biometric traits
Metrics
Medical services
integrated digital signature
Human behavior
advanced biometric home security system
Geo-Detection
DNA cryptography
DNA
digital signatures
digital signature
Cryptography
Conferences
biometrics (access control)
authorisation
authentication
advanced security system
biblio
An improved differential privacy algorithm to protect re-identification of data
Submitted by grigby1 on Wed, 01/10/2018 - 11:38am
Human behavior
ε-differential privacy
two-layer privacy
sanitized data
Resiliency
re-identification risk
Publishing
pubcrawl
privacy
Policy
Partitioning algorithms
mining trends
Medical services
machine learning algorithms
improved differential privacy algorithm
Human Factors
Algorithm design and analysis
healthcare organizations
decision-making systems
data sharing
data set
data sanitization algorithm
Data Sanitization
data repositories
data privacy
Data mining
data donors
data custodians
customer service
credible information
Compositionality
collaboration
biblio
Achieving data security in wireless sensor networks using ultra encryption standard version \#x2014; IV algorithm
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
Cryptography
Elliptic curve cryptography
encryption
energy efficient
Medical services
Metrics
Monitoring
pubcrawl
Resiliency
Scalability
sensor networks
wireless sensor networks
biblio
Cyber security risk management for health-based critical infrastructures
Submitted by grigby1 on Mon, 12/04/2017 - 11:58am
Metrics
Systems
security of data
security
secure recovery
Scientific Computing Security
risk management
Resiliency
recovery
pubcrawl
PhD project
Ontologies
modeling
Biological system modeling
Medical services
health-based critical infrastructures
health care critical infrastructures
health care
Health
cyber-physical systems
cyber-physical security
cyber-physical
critical infrastructures
computer security
Compositionality
biblio
Android #x0022;Health-Dr. #x0022; Application for Synchronous Information Sharing
Submitted by BrandonB on Wed, 05/06/2015 - 1:16pm
middleware
Health-DR. Engineering
healthy environment
Insurance
Insurance acumen or actuary
insurance agent
IT environment
medical annals
Medical services
electronic health records
Mobile communication
mobile computing
patient affability
Patient flexibility
physician
professional authentications
synchronous information sharing
user authentication
bibliography
Alert mechanism
ambulatory appliances
Android (operating system)
Android Health-Dr
Androids
annals management
Annotations of records
authentication
affability management
client discovery
database transit
Databases
dispensary
doctor affability
Doctor Flexibility
e-health application
Educational institutions
biblio
An overview of cloud middleware services for interconnection of healthcare platforms
Submitted by BrandonB on Wed, 05/06/2015 - 1:12pm
middleware
Healthcare
healthcare platform interconnection
heterogeneous devices
IaaS
management problem
medical computing
medical devices
Medical services
health care
PaaS
performance improvement
security
security of data
security problem
Software Architecture
software performance evaluation
standards
cloud technologies
application program interfaces
Big Data
big-data analytics
Biomedical imaging
cloud
Cloud architecture
Cloud Computing
cloud computing middleware services
API
computer architecture
Context
data analysis
Data integration
data sources
delay problem
electronic health records
electronic healthcare register literature
biblio
A support middleware solution for e-healthcare system security
Submitted by BrandonB on Wed, 05/06/2015 - 1:10pm
Logic gates
wireless sensor networks
system security
support middleware solution
security vulnerabilities
security of data
patient information security
patient information privacy
network security
middleware
Medical services
medical administrative data processing
masquerade attack
authentication
Internet security
information sharing
health care-specific security standards
health care organizations
health care
electronic health care
e-Healthcare
e-health care system security
Data Security
data privacy
data integrity
Communication system security
biblio
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system
Submitted by BrandonB on Wed, 05/06/2015 - 12:45pm
medical information systems
wireless sensor networks
Wireless body area networks
WBAN
sensors
secure key management scheme
secure communication
public key cryptography
patient medical information protection
message authentication
Medical services
authenticated message exchange
key management
healthcare system
healthcare security
health care
Elliptic curves
Elliptic curve cryptography
ECC algorithm
body area sensor network security
body area networks
biblio
A User Centric Identity Management for Internet of Things
Submitted by BrandonB on Tue, 05/05/2015 - 7:42am
authentication
authorisation
authorization
device authentication
device identity
identity management systems
IDM system
Internet of Things
Medical services
Mobile handsets
user centric identity management
user identity
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
next ›
last »