References
- Au, M. H., & Choo, K.-K. R. (2017). Chapter 1 – Mobile security and privacy. In M. H. Au & K.-K. R. Choo (Eds.), Mobile security and privacy: Advances, challenges and future research directions (pp. 1–4). Boston: Syngress. https://doi.org/10.1016/B978-0-12-804629-6.00001-8.
- Ashish Joshi & Amar Kumar Mohapatra (2019) Authentication protocols for wireless body area network with key management approach, Journal of Discrete Mathematical Sciences and Cryptography, 22:2, 219–240, DOI: 10.1080/09720529.2019.1582869
- C. Dwork, “Differential privacy: A survey of results,” in International Conference on Theory and Application Models of Computation, Springer 2008, pp 1-19.
- C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in TCC, vol. 3876. Springer,2006, pp. 265–284.
- J. L. H. Ramos, J. B. Bernabé, and A. F. Skarmeta, “Towards privacy preserving data sharing in smart environments,” in Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on. IEEE, 2014, pp. 334–339.
- Kamalanathan Chandran, Sunita Panda & Bhaskara Sreenivas (2020) An efficient secure authentication scheme for personalized healthcare system, Journal of Interdisciplinary Mathematics, 23:1, 215-227, DOI: 10.1080/09720502.2020.1721714
- L. Sweeney, “k-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557–570, 2002. doi: 10.1142/S0218488502001648
- L. Sweeney, “Simple demographics often identify people uniquely,” Health (San Francisco), vol. 671, pp. 1–34, 2000
- Raggo, M. T., & Raggo, M. T. (2016). Chapter 3 – Mobile security countermeasures. In Mobile data loss (pp. 17–28). Boston: Syngress. https://doi.org/10.1016/B978-0-12-802864-3.00003-9.
- Sarvesh Tanwar & Anil Kumar (2019) An efficient and secure identity based multiple signatures scheme based on RSA, Journal of Discrete Mathematical Sciences and Cryptography, 22:6, 953-971, DOI: 10.1080/09720529.2019.1632024
- Stojkoska, B.L.R., Trivodaliev, K.V.: A review of Internet of Things for smart home: challenges and solutions. J. Clean. Prod. 140, 1454– 1464 (2016) In the age of big data,” IEEE access, vol. 4, pp. 2751–2763, 2016. doi: 10.1016/j.jclepro.2016.10.006
- Tully, S., & Mohanraj, Y. (2017). Chapter 2 – Mobile security: A practitioner’s perspective. In Mobile security and privacy (pp. 5–55). Boston: Syngress. https://doi.org/10.1016/B978-0-12-804629-6.00002-X.
- Webpage of Wikipedia. https://en.wikipedia.org/wiki/Machine_to_machine. Last accessed 2018/12/20.
- R. Hall, A. Rinaldo, and L. Wasserman, “Differential Privacy for Functions and Functional Data,” Journal of Machine Learning Research, 2013, pp.703-727.
- Razafimandimby, C., Loscri, V., & Vegni, A. M. (2016, April). A neural network and IoT based scheme for performance assessment in internet of robotic things. In 2016 IEEE first international conference on internet-of-things design and implementation (IoTDI) (pp. 241-246). IEEE.
- Ying Wang, Jian He, Hao Zhao, Yao-Hui Han & Xiao-Jiang Huang (2018) Intelligent community medical service based on internet of things, Journal of Interdisciplinary Mathematics, 21:5, 1121-1126, DOI:10.1080/09720502.2018.14930