2021
DOI: 10.1007/s12652-020-02733-1
|View full text |Cite
|
Sign up to set email alerts
|

Security algorithms for distributed storage system for E-health application over wireless body area network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…The utilization possibilities of THz technology are broad and encompass swift mobile and wireless communication, environmental surveillance, safeguarding, and monitoring for the detection of hazardous substances and explosive materials, medical and healthcare uses, pharmaceutical delivery, T-ray imaging, material analysis, and even the remote identification of celestial substances and planets 5 , 6 . Despite notable advancements in THz technology post-2010, notably in high-powered sources, uncooled detectors, and real-time imaging, there exist underlying challenges that must be resolved to render these systems commercially feasible and seamlessly integrated into flexible electronics.…”
Section: Prior Literature Reviewmentioning
confidence: 99%
“…The utilization possibilities of THz technology are broad and encompass swift mobile and wireless communication, environmental surveillance, safeguarding, and monitoring for the detection of hazardous substances and explosive materials, medical and healthcare uses, pharmaceutical delivery, T-ray imaging, material analysis, and even the remote identification of celestial substances and planets 5 , 6 . Despite notable advancements in THz technology post-2010, notably in high-powered sources, uncooled detectors, and real-time imaging, there exist underlying challenges that must be resolved to render these systems commercially feasible and seamlessly integrated into flexible electronics.…”
Section: Prior Literature Reviewmentioning
confidence: 99%
“…To address data confidentiality, various data encryption techniques have been used in WBAN literature [20]. Many researchers have recently contributed to the data confidentiality requirements of WBAN [21][22][23][24][25][26][27]. Data Access Control provides role based access of the private information of patients to doctors, physicians or any other parties where it is needed.…”
Section: Privacy Protection Requirementsmentioning
confidence: 99%