Aged people, patients with chronic disease, patients at remote location need continuous monitoring under healthcare professionals. Remote health monitor is likely to be an effective approach to provide healthcare service in a simple and cost effective way. However, effective implementation of this type of framework needs consid-eration of variety of security threats. In this paper, a layer based remote health monitor framework is proposed to analyze health condition of patients from remote places. Beside this, a multi-modal biometric authentication mechanism is proposed here to reduce misuse of health data and biometrics templates in heterogeneous cloud environment. Main focus of the paper is to design semi-continuous authentication mechani...
Abstract- User authentication, as a fundamental security protocol, has been addressed with more conc...
The cloud healthcare system has become the essential online service during the COVID-19 pandemic. In...
Advances in distributed computing and virtualization allowed cloud computing to establish itself as ...
Aged people, patients with chronic disease, patients at remote location need continuous monitoring u...
This paper proposes a novel identity management framework for Internet of Things (IoT) and cloud com...
The technological advancements in the field of remote sensing have resulted in substantialgrowth of ...
Abstract: Authenticating the user based on behavior based biometrics is more reliable than the more...
Part 3: Authentication and ProfilingInternational audienceBiometric-based authentication system offe...
Use of remote healthcare monitoring application (HMA) can not only enable healthcare seeker to live ...
Mobile cloud computing integrates cloud computing into mobile environments, allowing users to use da...
With the advent of modern technologies, the healthcare industry is moving towards a more personalise...
Part 3: Biometrics and Biometrics ApplicationsInternational audienceRapid development of smart techn...
© Springer International Publishing AG 2017. Biometric authentication is becoming increasingly popul...
A range of issues arises in biometric authentication primarily concerning protection of biometric da...
The advancement of network technology has changed the world’s perspective toward the Internet. The g...
Abstract- User authentication, as a fundamental security protocol, has been addressed with more conc...
The cloud healthcare system has become the essential online service during the COVID-19 pandemic. In...
Advances in distributed computing and virtualization allowed cloud computing to establish itself as ...
Aged people, patients with chronic disease, patients at remote location need continuous monitoring u...
This paper proposes a novel identity management framework for Internet of Things (IoT) and cloud com...
The technological advancements in the field of remote sensing have resulted in substantialgrowth of ...
Abstract: Authenticating the user based on behavior based biometrics is more reliable than the more...
Part 3: Authentication and ProfilingInternational audienceBiometric-based authentication system offe...
Use of remote healthcare monitoring application (HMA) can not only enable healthcare seeker to live ...
Mobile cloud computing integrates cloud computing into mobile environments, allowing users to use da...
With the advent of modern technologies, the healthcare industry is moving towards a more personalise...
Part 3: Biometrics and Biometrics ApplicationsInternational audienceRapid development of smart techn...
© Springer International Publishing AG 2017. Biometric authentication is becoming increasingly popul...
A range of issues arises in biometric authentication primarily concerning protection of biometric da...
The advancement of network technology has changed the world’s perspective toward the Internet. The g...
Abstract- User authentication, as a fundamental security protocol, has been addressed with more conc...
The cloud healthcare system has become the essential online service during the COVID-19 pandemic. In...
Advances in distributed computing and virtualization allowed cloud computing to establish itself as ...