-
1
-
-
84904582459
-
A mobile wireless body area network platform
-
Jul.
-
B. Alghamdi and H. Fouchal, "A mobile wireless body area network platform," J. Comput. Sci., vol. 5, no. 4, pp. 664-674, Jul. 2014.
-
(2014)
J. Comput. Sci.
, vol.5
, Issue.4
, pp. 664-674
-
-
Alghamdi, B.1
Fouchal, H.2
-
3
-
-
77951270415
-
The design and evaluation of personalised ambient mental health monitors
-
Las Vegas, NV, USA
-
J. M. Blum and E. H. Magill, "The design and evaluation of personalised ambient mental health monitors," presented at the 7th IEEE Conf. Consum. Commun. Netw. Conf., Las Vegas, NV, USA, 2010, pp. 1-5.
-
(2010)
The 7th IEEE Conf. Consum. Commun. Netw. Conf.
, pp. 1-5
-
-
Blum, J.M.1
Magill, E.H.2
-
4
-
-
80052698438
-
C-SMART: Efficient seamless cellular phone based patient monitoring system
-
Jun.
-
G. Blumrosen, N. Avisdris, R. Kupfer, and B. Rubinsky, "C-SMART: Efficient seamless cellular phone based patient monitoring system," presented at the IEEE Int. Symp. World Wireless, Mobile Multimedia Netw., Jun. 2011, pp. 1-6.
-
(2011)
The IEEE Int. Symp. World Wireless, Mobile Multimedia Netw.
, pp. 1-6
-
-
Blumrosen, G.1
Avisdris, N.2
Kupfer, R.3
Rubinsky, B.4
-
5
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
Helsinki, Finland, Aug.
-
E Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the Internet of Things," presented at the 1st edition MCC Workshop Mobile Cloud Comput., Helsinki, Finland, Aug. 2012, pp. 13-16.
-
(2012)
The 1st Edition MCC Workshop Mobile Cloud Comput.
, pp. 13-16
-
-
Bonomi, E.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
6
-
-
84944262629
-
Collaborative filtering with privacy
-
May
-
J. Canny, "Collaborative filtering with privacy," presented at the IEEE Symp. Secur. Privacy, May 2002, pp. 45-57.
-
(2002)
The IEEE Symp. Secur. Privacy
, pp. 45-57
-
-
Canny, J.1
-
7
-
-
0036993076
-
Collaborative filtering with privacy via factor analysis
-
Tampere, Finland, May
-
J. Canny, "Collaborative filtering with privacy via factor analysis," presented at the 25th Annu. Int. ACM SIGIR Conf. Res. Develop. Inf. Retr., Tampere, Finland, May 2002, pp. 45-57.
-
(2002)
The 25th Annu. Int. ACM SIGIR Conf. Res. Develop. Inf. Retr.
, pp. 45-57
-
-
Canny, J.1
-
8
-
-
84863179355
-
Attitudes towards information privacy
-
S. Cockcroft and P. Clutterbuck, "Attitudes towards information privacy," in Proc. ACIS, 2001, p. 20.
-
(2001)
Proc. ACIS
, pp. 20
-
-
Cockcroft, S.1
Clutterbuck, P.2
-
9
-
-
85009164559
-
-
Forbes New York, NY, USA, Tech. Rep.
-
L. Columbus, "83% of healthcare organizations are using cloud-based apps today," Forbes, New York, NY, USA, Tech. Rep., 2014.
-
(2014)
83% of Healthcare Organizations Are Using Cloud-based Apps Today
-
-
Columbus, L.1
-
10
-
-
84992015113
-
Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector
-
E. Commission
-
E. Commission, "Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector," Off. J. L, vol. 201, no. 31, p. 7, 2002.
-
(2002)
Off. J. L
, vol.201
, Issue.31
, pp. 7
-
-
-
11
-
-
1642301688
-
T didn't buy it for myself privacy and ecommerce personalization,"
-
Washington, DC, USA
-
L. E Cranor, "T didn't buy it for myself privacy and ecommerce personalization," presented at the ACM Workshop Privacy Electron. Soc, Washington, DC, USA, 2003, pp. 111-117.
-
(2003)
The ACM Workshop Privacy Electron. Soc
, pp. 111-117
-
-
Cranor, L.E.1
-
13
-
-
85084161366
-
Tor: The second-generation onion router
-
San Diego, CA, USA
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second-generation onion router," presented at the 13th Conf. USENIX Secur. Symp., vol. 13. San Diego, CA, USA, 2004.
-
(2004)
The 13th Conf. USENIX Secur. Symp.
, vol.13
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
14
-
-
0003187764
-
95/46/EC of the European Parliament and of the Council of 24 Oct. 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
Directive, E., "95/46/EC of the European Parliament and of the Council of 24 Oct. 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data," Off. J. EC, vol. 23, no. 6, 1995.
-
(1995)
Off. J. EC
, vol.23
, Issue.6
-
-
Directive, E.1
-
16
-
-
84903720938
-
Privacy aware obfuscation middleware for mobile jukebox recommender services
-
Kaunas, Lithuania
-
A. Elmisery and D. Botvich, "Privacy aware obfuscation middleware for mobile jukebox recommender services," presented at the 11th IFIP Conf. e-Business, e-Service, e-Society, Kaunas, Lithuania, 2011, pp. 73-89, doi: 10.1007/978-3-642-27260-8-6.
-
(2011)
The 11th IFIP Conf. E-Business E-Service, E-Society
, pp. 73-89
-
-
Elmisery, A.1
Botvich, D.2
-
17
-
-
84860796322
-
Privacy aware recommender service using multi-agent middleware- an IPTV network scenario
-
A. Elmisery and D. Botvich, "Privacy aware recommender service using multi-agent middleware- an IPTV network scenario," Informatica, vol. 36, no. 1, 2012.
-
(2012)
Informatica
, vol.36
, Issue.1
-
-
Elmisery, A.1
Botvich, D.2
-
18
-
-
84903727280
-
Private personalized social recommendations in an IPTV system
-
A. M. Elmisery, "Private personalized social recommendations in an IPTV system," New Rev. Hypermedia Multimedia, vol. 20, no. 2, pp. 145-167, 2014, doi: 10.1080/13614568.2014.889222.
-
(2014)
New Rev. Hypermedia Multimedia
, vol.20
, Issue.2
, pp. 145-167
-
-
Elmisery, A.M.1
-
21
-
-
84869597343
-
Agent based middleware for maintaining user privacy in IPTV recommender services
-
Aalborg, Denmark, May
-
A. M. Elmisery and D. Botvich, "Agent based middleware for maintaining user privacy in IPTV recommender services," in Proc. 3rd Int. ICST Conf. Secur. Privacy Mobile Inf. Commun. Syst. MobiSec, Aalborg, Denmark, May 2011, pp. 64-75, doi: 10.1007/978-3-642-30244-2-6.
-
(2011)
Proc. 3rd Int. ICST Conf. Secur. Privacy Mobile Inf. Commun. Syst. MobiSec
, pp. 64-75
-
-
Elmisery, A.M.1
Botvich, D.2
-
22
-
-
84888387545
-
Multi-agent based middleware for protecting privacy in IPTV content recommender services
-
A. M. Elmisery and D. Botvich, "Multi-agent based middleware for protecting privacy in IPTV content recommender services," Multimedia Tools Appi., vol. 64, no. 2, pp. 249-275, 2013, doi: 10.1007/sll042-012-1067-3.
-
(2013)
Multimedia Tools Appi.
, vol.64
, Issue.2
, pp. 249-275
-
-
Elmisery, A.M.1
Botvich, D.2
-
23
-
-
84879122636
-
-
Amsterdam, The Netherlands: IOS Press
-
A. M. Elmisery, K. Doolin, and D. Botvich, Privacy Aware Community Based Recommender Service for Conferences Attendees, vol. 243. Amsterdam, The Netherlands: IOS Press, 2012, doi: 10.3233/978-1-61499-105-2-519.
-
(2012)
Privacy Aware Community Based Recommender Service for Conferences Attendees
, vol.243
-
-
Elmisery, A.M.1
Doolin, K.2
Botvich, D.3
-
24
-
-
84868586727
-
-
S.-S. Yeo, Y Pan, S. Y Lee, and B. H. Chang, Eds. Dordrecht, The Netherlands: Springer
-
A. M. Elmisery, K. Doolin, I. Roussaki, and D. Botvich, Enhanced Middleware for Collaborative Privacy in Community Based Recommendations Services (Computer Science and its Applications), vol. 203, S.-S. Yeo, Y Pan, S. Y Lee, and B. H. Chang, Eds. Dordrecht, The Netherlands: Springer, 2012, pp. 313-328, doi: 10.1007/978-94-007-5699-l-32.
-
(2012)
Enhanced Middleware for Collaborative Privacy in Community Based Recommendations Services (Computer Science and Its Applications)
, vol.203
, pp. 313-328
-
-
Elmisery, A.M.1
Doolin, K.2
Roussaki, I.3
Botvich, D.4
-
25
-
-
78649884242
-
Privacy preserving distributed learning clustering of healthcare data using cryptography protocols
-
Jul.
-
A. M. Elmisery and H. Fu, "Privacy preserving distributed learning clustering of healthcare data using cryptography protocols," presented at the IEEE 34th Annu. Comput. Softw. Appi. Conf. Workshops (COMPSACW), Jul. 2010, pp. 19-23, doi: 10.1109/COMPSACW.2010.33.
-
(2010)
The IEEE 34th Annu. Comput. Softw. Appi. Conf. Workshops (COMPSACW)
, pp. 19-23
-
-
Elmisery, A.M.1
Fu, H.2
-
26
-
-
84908519405
-
Collaborative privacy framework for minimizing privacy risks in an IPTV social recommender service
-
Nov.
-
A.M. Elmisery, S.Rho, and D. Botvich, "Collaborative privacy framework for minimizing privacy risks in an IPTV social recommender service," Multimedia Tools Appi, vol. 75, no. 22, pp. 14927-14957, Nov. 2016, doi: 10.1007/sl 1042-014-2271-0.
-
(2016)
Multimedia Tools Appi
, vol.75
, Issue.22
, pp. 14927-14957
-
-
Elmisery, A.M.1
Rho, S.2
Botvich, D.3
-
27
-
-
84957432012
-
Privacy-enhanced middleware for location-based sub-community discovery in implicit social groups
-
Jan.
-
A. M. Elmisery, S. Rho, and D. Botvich, "Privacy-enhanced middleware for location-based sub-community discovery in implicit social groups," J. Supercomput., vol. 72, no. 1, pp. 247-274, Jan. 2016, doi: 10.1007/sll227-015-1574-x.
-
(2016)
J. Supercomput.
, vol.72
, Issue.1
, pp. 247-274
-
-
Elmisery, A.M.1
Rho, S.2
Botvich, D.3
-
30
-
-
33748982636
-
SATIRE: A software architecture for smart AtTIRE
-
Uppsala, Sweden
-
R. K. Ganti, P. Jayachandran, T. E Abdelzaher, and J. A. Stankovic, "SATIRE: A software architecture for smart AtTIRE," presented at the 4th Int. Conf. Mobile Syst., Appi. Services, Uppsala, Sweden, 2006.
-
(2006)
The 4th Int. Conf. Mobile Syst., Appi. Services
-
-
Ganti, R.K.1
Jayachandran, P.2
Abdelzaher, T.E.3
Stankovic, J.A.4
-
31
-
-
35348924316
-
PRIVE: Anonymous location-based queries in distributed mobile systems
-
Banff, AB, Canada
-
G. Ghinita, P. Kalnis, and S. Skiadopoulos, "PRIVE: Anonymous location-based queries in distributed mobile systems," presented at the 16th Int. Conf. World Wide Web, Banff, AB, Canada, 2007.
-
(2007)
The 16th Int. Conf. World Wide Web
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
32
-
-
70350714539
-
Challenges in supporting end-user privacy and security management with social navigation
-
Mountain View, CA, USA
-
J. Goecks, W. K. Edwards, and E. D. Mynatt, "Challenges in supporting end-user privacy and security management with social navigation," presented at the 5th Symp. Usable Privacy Secur., Mountain View, CA, USA, 2009.
-
(2009)
The 5th Symp. Usable Privacy Secur.
-
-
Goecks, J.1
Edwards, W.K.2
Mynatt, E.D.3
-
33
-
-
84867301818
-
A privacy-strengthened scheme for E-healthcare monitoring system
-
C. Huang, H. Lee, and D. H. Lee, "A privacy-strengthened scheme for E-healthcare monitoring system," J. Med. Syst., vol. 36, no. 5, pp. 2959-2971, 2012, doi: 10.1007/s10916-011-9774-2.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.5
, pp. 2959-2971
-
-
Huang, C.1
Lee, H.2
Lee, D.H.3
-
34
-
-
29844458622
-
Deriving private information from randomized data
-
Baltimore, MD, USA
-
Z. Huang, W. Du, and B. Chen, "Deriving private information from randomized data," presented at the ACM SIGMOD Int. Conf. Manag. Data, Baltimore, MD, USA, 2005.
-
(2005)
The ACM SIGMOD Int. Conf. Manag. Data
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
37
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the privacy preserving properties of random data perturbation techniques," presented at the 3rd IEEE Int. Conf. Data Mining, 2003.
-
(2003)
The 3rd IEEE Int. Conf. Data Mining
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
38
-
-
84871969604
-
Lightweight cryptography for the Internet of Things
-
M. Katagi and S. Moriai, "Lightweight cryptography for the Internet of Things," Sony Corp., pp. 7-10, 2008.
-
(2008)
Sony Corp.
, pp. 7-10
-
-
Katagi, M.1
Moriai, S.2
-
39
-
-
70349618430
-
Applying consistency-based trust definition to collaborative filtering
-
H. D. Kim, "Applying consistency-based trust definition to collaborative filtering," KSII Trans. Internet Inf. Syst., vol. 3, no. 4, pp. 366-374, 2009.
-
(2009)
KSII Trans. Internet Inf. Syst.
, vol.3
, Issue.4
, pp. 366-374
-
-
Kim, H.D.1
-
40
-
-
10944253573
-
Sensor networks for emergency response: Challenges and opportunities
-
Apr.
-
K. Lorincz, "Sensor networks for emergency response: Challenges and opportunities," IEEE Pervasive Comput., vol. 3, no. 4, pp. 16-23, Apr. 2004, doi: 10.1109/mprv.18.
-
(2004)
IEEE Pervasive Comput.
, vol.3
, Issue.4
, pp. 16-23
-
-
Lorincz, K.1
-
41
-
-
35549002780
-
Addressing security in medical sensor networks
-
San Juan, PR, Territory
-
K. Malasri and L. Wang, "Addressing security in medical sensor networks," presented at the 1st ACM SIGMOBILE Int. Workshop Syst. Netw. Support Healthcare Assisted living Environ., San Juan, PR, Territory, 2007.
-
(2007)
The 1st ACM SIGMOBILE Int. Workshop Syst. Netw. Support Healthcare Assisted Living Environ
-
-
Malasri, K.1
Wang, L.2
-
42
-
-
84961227396
-
-
[Online]
-
J. Manyika. (2015). Unlocking the Potential of the Internet of Things. [Online]. Available: http://www.mckinsey.com/business-functions/business-technology/our-insights/the-internet-of-things-the-value-of-digitizing-the-physical-world
-
(2015)
Unlocking the Potential of the Internet of Things
-
-
Manyika, J.1
-
43
-
-
85009191604
-
-
[Online] html and http://Market Research.com
-
(2015). IoT Deployments in Healthcare to Reach $117 Billion by 2020, Says New Mind Commerce Report. [Online]. Available: http://www.prnewswire.com/news-releases/marketresearchcom-iot-deployments-in-healthcare-to-reach-117-billion-by-2020-says-new-mind-commerce-report-300070129.html and http://Market Research.com
-
(2015)
IoT Deployments in Healthcare to Reach $117 Billion by 2020, Says New Mind Commerce Report
-
-
-
44
-
-
84991272212
-
-
[Online] htmlandhttp://MarketsandMarkets.com
-
(2015). IoT Healthcare Market by Components (Medical Device, System and Software, Service, and Connectivity Technology), Application (Telemedicine, Workflow Management, Connected Imaging, Medication Management), End-User-Global Forecast to 2020. [Online]. Available: http://www.marketsandmarkets.com/Market-Reports/iot-healthcare-market-160082804.html and http://MarketsandMarkets.com
-
(2015)
IoT Healthcare Market by Components (Medical Device, System and Software, Service, and Connectivity Technology), Application (Telemedicine, Workflow Management, Connected Imaging, Medication Management), End-User-Global Forecast to 2020
-
-
-
45
-
-
85076227478
-
On the feasibility of side-channel attacks with brain-computer interfaces
-
Bellevue, WA, USA
-
I. Martinovic, M. Frank, D. Perito, T. Ros, and D. Song, "On the feasibility of side-channel attacks with brain-computer interfaces," presented at the 21st USENIX Conf. Secur. Symp., Bellevue, WA, USA, 2012.
-
(2012)
The 21st USENIX Conf. Secur. Symp.
-
-
Martinovic, I.1
Frank, M.2
Perito, D.3
Ros, T.4
Song, D.5
-
47
-
-
3843049042
-
PocketLens: Toward a personal recommender system
-
[Online]
-
B. N. Miller, J. A. Konstan, and J. Riedl, "PocketLens: Toward a personal recommender system," ACM Trans. Inf. Syst., vol. 22, no. 3, pp. 437-476, 2004, doi:10.1145/1010614.1010618. [Online]. Available: http://doi.acm.org/
-
(2004)
ACM Trans. Inf. Syst.
, vol.22
, Issue.3
, pp. 437-476
-
-
Miller, B.N.1
Konstan, J.A.2
Riedl, J.3
-
48
-
-
85009177153
-
Healthopia: Towards your well-being in everyday life
-
Barcelona, Spain
-
C. Min, C. Yoo, Y. Lee, and J. Song, "Healthopia: Towards your well-being in everyday life," presented at the 4th Int. Symp. Appl. Sci. Biomed. Commun. Technol., Barcelona, Spain, 2011.
-
(2011)
The 4th Int. Symp. Appl. Sci. Biomed. Commun. Technol.
-
-
Min, C.1
Yoo, C.2
Lee, Y.3
Song, J.4
-
51
-
-
84869136735
-
A study of preferences for sharing and privacy
-
Portland, OR, USA
-
J. S. Olson, J. Grudin, and E. Horvitz, "A study of preferences for sharing and privacy," presented at the CHI Extended Abstracts Human Factors Comput. Syst., Portland, OR, USA, 2005.
-
(2005)
The CHI Extended Abstracts Human Factors Comput. Syst.
-
-
Olson, J.S.1
Grudin, J.2
Horvitz, E.3
-
52
-
-
85009165433
-
The first big Internet of Things security breach is just around the corner
-
D. Palmer, "The first big Internet of Things security breach is just around the corner," ZDNet, Tech Rep., 2016.
-
(2016)
ZDNet Tech Rep.
-
-
Palmer, D.1
-
53
-
-
85047227272
-
Privacy preserving data obfuscation for inherently clustered data
-
R. Parameswaran and D. M. Blough, "Privacy preserving data obfuscation for inherently clustered data," Int. J. Inf. Comput. Secur., vol. 2, no. 1, pp. 4-26, 2008, doi: 10.1504/ijics.016819.
-
(2008)
Int. J. Inf. Comput. Secur.
, vol.2
, Issue.1
, pp. 4-26
-
-
Parameswaran, R.1
Blough, D.M.2
-
54
-
-
46749122242
-
Privacy-preserving collaborative filtering using randomized perturbation techniques
-
H. Polat and W. Du, "Privacy-preserving collaborative filtering using randomized perturbation techniques," presented at the 3rd IEEE Int. Conf. Data Mining, 2003.
-
(2003)
The 3rd IEEE Int. Conf. Data Mining
-
-
Polat, H.1
Du, W.2
-
55
-
-
33644514610
-
SVD-based collaborative filtering with privacy
-
Santa Fe, NM, USA
-
H. Polat and W. Du, "SVD-based collaborative filtering with privacy," presented at the ACM Symp. Appl. Comput., Santa Fe, NM, USA, 2005.
-
(2005)
The ACM Symp. Appl. Comput.
-
-
Polat, H.1
Du, W.2
-
56
-
-
0035509452
-
Privacy risks in recommender systems
-
Nov.
-
N. Ramakrishnan, B. J. Keller, B. J. Mirza, A. Y. Grama, and G. Karypis, "Privacy risks in recommender systems," IEEE Internet Comput., vol. 5, no. 6, pp. 54-63, Nov. 2001.
-
(2001)
IEEE Internet Comput.
, vol.5
, Issue.6
, pp. 54-63
-
-
Ramakrishnan, N.1
Keller, B.J.2
Mirza, B.J.3
Grama, A.Y.4
Karypis, G.5
-
58
-
-
84973872464
-
MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks
-
D. Storm, "MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks," Computerworld, Tech. Rep., 2015.
-
(2015)
Computerworld Tech. Rep.
-
-
Storm, D.1
-
59
-
-
70449562519
-
IBE-lite: A lightweight identity-based cryptography for body sensor networks
-
Jun.
-
C. C. Tan, H. Wang, S. Zhong, and Q. Li, "IBE-lite: A lightweight identity-based cryptography for body sensor networks," Trans. Inf. Technol. Biomed., vol. 13, no. 6, pp. 926-932, Jun. 2009, doi: 10.1109/titb.2033055.
-
(2009)
Trans. Inf. Technol. Biomed.
, vol.13
, Issue.6
, pp. 926-932
-
-
Tan, C.C.1
Wang, H.2
Zhong, S.3
Li, Q.4
-
60
-
-
84971269044
-
-
The Wall Street Journal [Online]
-
E. J. Topol. (2015). The Future of Medicine is in Your Smartphone. The Wall Street Journal. [Online]. Available: http://www.wsj.com/articles/the-future-of-medicine-is-in-your-smartphone-1420828632
-
(2015)
The future of medicine is in your smartphone
-
-
Topol, E.J.1
-
61
-
-
34548269952
-
Pervasive healthcare and wireless health monitoring
-
U. Varshney, "Pervasive healthcare and wireless health monitoring," Mob. Netw. Appl., vol. 12, nos. 2-3, pp. 113-127, 2007, doi: 10.1007/s11036-007-0017-1.
-
(2007)
Mob. Netw. Appl.
, vol.12
, Issue.2-3
, pp. 113-127
-
-
Varshney, U.1
-
62
-
-
20544447851
-
Codeblue: An ad hoc sensor network infrastructure for emergency medical care
-
D. Malan, T. Fulford-Jones, M. Welsh, and S. Moulton, "Codeblue: An ad hoc sensor network infrastructure for emergency medical care," in Proc. Int. Workshop Wearable Implantable Body Sensor Netw., vol. 5. 2004.
-
(2004)
Proc. Int. Workshop Wearable Implantable Body Sensor Netw.
, vol.5
-
-
Malan, D.1
Fulford-Jones, T.2
Welsh, M.3
Moulton, S.4
|