Author of the publication

An evaluation of break-the-glass access control model for medical data in wireless sensor networks.

, , , and . Healthcom, page 130-135. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BTG-AC: Break-the-Glass Access Control Model for Medical Data in Wireless Sensor Networks., , , and . IEEE J. Biomed. Health Informatics, 20 (3): 763-774 (2016)Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain., , , and . Comput. Networks, (2022)Telephony Denial of Service defense at data plane (TDoSD@DP)., , and . NOMS, page 1-6. IEEE, (2018)The Use of Visual and Auditory Feedback for Assembly Task Performance in a Virtual Environment., , , and . IV, page 779-784. IEEE Computer Society, (2005)Trustworthiness and authentication in ubiquitous computing., , , and . MOBIWAC, page 135-138. ACM, (2012)Can Multi-sensory Feedback Improve the Usability of the Virtual Assembly Environment?, , and . CIT, page 132. IEEE Computer Society, (2006)Theoretical analysis of TCP throughput in adhoc wireless networks., , , and . GLOBECOM, page 6. IEEE, (2005)Bluetooth-Based Sensor Networks for Remotely Monitoring the Physiological Signals of a Patient., and . IEEE Trans. Information Technology in Biomedicine, 13 (6): 1040-1048 (2009)A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels., , and . Trustcom/BigDataSE/ISPA, page 332-339. IEEE, (2016)Evaluating security and usability of profile based challenge questions authentication in online examinations., , , and . J. Internet Serv. Appl., 5 (1): 2:1-2:16 (2014)