Medical IoT: A Comprehensive Survey of Different Encryption and Security Techniques.
Suleiman K. KharroubKhalid AbualsaudMohsen GuizaniPublished in: IWCMC (2020)
Keyphrases
- key management
- security properties
- encryption algorithms
- encryption decryption
- encryption scheme
- security problems
- data encryption
- high security
- encryption algorithm
- identity authentication
- security analysis
- key exchange
- management system
- digital rights management
- virtual private network
- data confidentiality
- public key cryptography
- elliptic curve cryptography
- security issues
- security requirements
- private key
- ad hoc networks
- information security
- key distribution
- security protocols
- resource constrained
- integrity verification
- image encryption
- data security
- public key
- digital signature
- rfid systems
- security mechanisms
- medical diagnosis
- mutual authentication
- secret key
- advanced encryption standard
- wireless sensor networks
- intrusion detection
- network security
- provably secure
- medical data
- cryptographic protocols
- elliptic curve
- stream cipher
- public key infrastructure
- cryptographic algorithms
- secure communication
- access control
- standard model