参考文献
|
-
Ahad, A.,Tahir, M.,Yau, K.L.A.(2019).5G-based smart healthcare network: architecture, taxonomy, challenges and future research directions.IEEE Access,7,100747-100762.
-
Al Shareeda, M.,Khalil, A.,Fahs, W.(2019).Realistic heterogeneous genetic-based RSU placement solution for V2I networks.International Arab Journal of Information Technology,16(3A),540-547.
-
Alshudukhi, J.S.,Al-Mekhlafi, Z.G.,Mohammed, B.A.(2019).A lightweight authentication with privacy-preserving scheme for vehicular ad hoc networks based on elliptic curve cryptography.IEEE Access,9,15633-15642.
-
Anwar, S.,Prasad, R.(2018).Framework for future telemedicine planning and infrastructure using 5G technology.Wireless Personal Communications,100(1),193-208.
-
Chettri, L.,Bera, R.(2020).a comprehensive survey on Internet of things (IoT) toward 5G wireless systems.IEEE Internet of Things Journal,7(1),16-32.
-
EMS Agenda 2050 Technical Expert Panel(2019).,Washington, DC:National Highway Traffic Safety Administration.
-
Fremantle, P.,Aziz, B.(2018).Cloud-based federated identity for the Internet of Things.Annales des Telecommunications/Annals of Telecommunications,73(7-8),415-427.
-
Gentry, C.,Silverberg, A.(2002).Hierarchical ID-based cryptography.8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2002),New Zealand:
-
Haq, I.U.,Wang, J.,Zhu, Y.(2020).Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks.Journal of Network and Computer Applications,161
-
Kocarev, L.(2001).Chaos-based cryptography: a brief overview.IEEE Circuits and Systems Magazine,1(3),6-21.
-
Kocarev, L.,Lian, S.(2011).Chaos-Based Cryptography: Theory, Algorithms and Applications.Germany (Berlin/Heidelberg):Springer.
-
Leaby, A.K.,Yassin, A.,Hasson, M.,Rashid, A.(2021).Towards design strong emergency and COVID-19 authentication scheme in VANET.Indonesian Journal of Electrical Engineering and Computer Science,21(3),1808-1819.
-
Lee, T.F.,Hsiao, C.H.,Hwang, S.H.,Lin, T.H.(2017).Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.PLoS ONE,12(7)
-
Lin, H.Y.(2015).Improved chaotic maps-based password-authenticated key agreement using smart cards.Communications in Nonlinear Science and Numerical Simulation,20(2),482-488.
-
Mukhopadhyay, A.,Sreekumar, S.,Xavier, B.,Suraj, M.(2019).A cloud-based smartphone solution for transmitting bio-signals from an emergency response vehicle.International Journal of E-Health and Medical Communications,10(3),22-38.
-
Office of the National Coordinator for Health Information Technology, “Emergency medical services (EMS) data integration to optimize patient care: an overview of the search, alert, file, reconcile (SAFR) model of health information exchange,” URL: https://www.healthit.gov/sites/default/files/emr_safer_knowledge_product_final.pdf (存取時間: 2022/04/23).
-
Park, Y.,Sur, C.,Rhee, K.H.(2011).A privacy-preserving location assurance protocol for location-aware services in VANETs.Wireless Personal Communications,61(4),779-791.
-
Santos, M.L.B.A.,Carneiro, J.C.,Franco, A.M.R.,Teixeira, F.A.,Henriques, M.A.A.,Oliveira, L.B.(2020).FLAT: federated lightweight authentication for the Internet of Things.Ad Hoc Networks,107
-
Shamir, A.(1985).Identity-based cryptosystems and signature schemes.Annual International Cryptology Conference (CRYPTO 1984),United States (Santa Barbara):
-
Shen, V.R.L.,Huang, W.C.(2015).A time-bound and hierarchical key management scheme for secure multicast systems.Wireless Personal Communications,85(4),1741-1764.
-
Solev, D.,Janjic, P.,Kocarev, L.(2011).Introduction to chaos.Studies in Computational Intelligence,354,1-25.
-
Yan, L.,Rong, C.,Zhao, G.(2009).Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography.1st International Conference on Cloud Computing (CloudCom 2009),China (Beijing):
-
Ying, B.,Nayak, A.(2019).Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography.Journal of Network and Computer Applications,131,66-74.
-
Yoon, E.J.,Jeon, I.S.(2011).An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map.Communications in Nonlinear Science and Numerical Simulation,16(6),2383-2389.
-
Yoon, E.J.,Yoo, K.Y.(2011).Cryptanalysis of group key agreement protocol based on chaotic hash function.IEICE Transactions on Information and Systems,E94(11),2167-2170.
-
Zhang, L.(2008).Cryptanalysis of the public key encryption based on multiple chaotic systems.Chaos, Solitons and Fractals,37(3),669-674.
-
中田孝明、織田成人、羽石秀昭、山尾恭生、鈴木哲也、近藤針次(2017)。實現及時正確急救醫療之智慧急救系統及裝置開發(早く正しい救急医療実現のためのスマートな救急情報システム・装置の開発)。第 26 次全國急救隊員論壇
|