1. Liang X, Li X, Barua M, Chen L, Lu R, Shen X, et al. Enable pervasive healthcare through continuous remote health monitoring. IEEE Wirel Commun. 2012; 19(6):10–18.
2. Li KF. Smart home technology for telemedicine and emergency management. J Ambient Intell Humaniz Comput. 2013; 4(5):535–546.
Article
3. Xu B, Xu L, Cai H, Xie C, Hu J, Bu F. Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Trans Industr Inform. 2014; 10(2):1578–1586.
Article
4. Chiuchisan I, Costin HN, Geman O. Adopting the internet of things technologies in health care systems. In : Proceedings of 2014 International Conference and Exposition on Electrical and Power Engineering (EPE); 2014 Oct 16-18; Iasi, Romania. p. 532–535.
5. Wootton R. Twenty years of telemedicine in chronic disease management: an evidence synthesis. J Telemed Telecare. 2012; 18(4):211–220.
Article
6. Ryu S. Telemedicine: opportunities and developments in member states: report on the Second Global Survey on eHealth 2009. Healthc Inform Res. 2012; 18(2):153–155.
Article
7. Nguyen KT, Laurent M, Oualha N. Survey on secure communication protocols for the Internet of Things. Ad Hoc Netw. 2015; 32:17–31.
Article
8. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A. Security, privacy and trust in Internet of Things: the road ahead. Comput Netw. 2015; 76:146–164.
Article
9. Vucinic M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R. OSCAR: object security architecture for the Internet of Things. Ad Hoc Netw. 2014; 32:3–16.
Article
10. Doukas C, Maglogiannis I, Koufi V, Malamateniou F, Vassilacopoulos G. Enabling data protection through PKI encryption in IoT m-Health devices. In : Proceedings of 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE); 2012 Nov 11-13; Larbaca, Cyprus. p. 25–29.
11. Hsu WS, Pan JI. Secure mobile agent for telemedicine based on P2P networks. J Med Syst. 2013; 37(3):9947.
Article
12. Al Ameen M, Liu J, Kwak K. Security and privacy issues in wireless sensor networks for healthcare applications. J Med Syst. 2012; 36(1):93–101.
Article
13. Camara C, Peris-Lopez P, Tapiador JE. Security and privacy issues in implantable medical devices: a comprehensive survey. J Biomed Inform. 2015; 55:272–289.
Article
14. Zaidan BB, Haiqi A, Zaidan AA, Abdulnabi M, Kiah ML, Muzamel H. A security framework for nationwide health information exchange based on telehealth strategy. J Med Syst. 2015; 39(5):51.
Article
15. Li M, Yu S, Zheng Y, Ren K, Lou W. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst. 2013; 24(1):131–143.
Article
16. Savola RM, Abie H, Sihvonen M. Towards metricsdriven adaptive security management in e-health IoT applications. In : Proceedings of the 7th International Conference on Body Area Networks; 2012 Sep 24-26; Oslo, Norway. p. 276–281.
17. Moosavi SR, Gia TN, Rahmani AM, Nigussie E, Virtanen S, Isoaho J, et al. SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Comput Sci. 2015; 52:452–459.
Article
18. Simplicio MA Jr, Iwaya LH, Barros BM, Carvalho TC, Naslund M. SecourHealth: a delay-tolerant security framework for mobile health data collection. IEEE J Biomed Health Inform. 2015; 19(2):761–772.
Article
19. Saleem S, Ullah S, Kwak KS. A study of IEEE 802.15.4 security framework for wireless body area networks. Sensors (Basel). 2011; 11(2):1383–1395.
Article
20. Zhang XM, Zhang N. An open, secure and flexible platform based on internet of things and cloud computing for ambient aiding living and telemedicine. In : Proceedings of 2011 International Conference on Computer and Management (CAMAN); 2011 May 19-21; Wuhan, China. p. 1–4.
21. Shini SG, Thomas T, Chithraranjan K. Cloud based medical image exchange-security challenges. Procedia Eng. 2012; 38:3454–3461.
Article
22. Chen HM, Lo JW, Yeh CK. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J Med Syst. 2012; 36(6):3907–3915.
Article
23. Jiang Q, Ma J, Ma Z, Li G. A privacy enhanced authentication scheme for telecare medical information systems. J Med Syst. 2013; 37(1):9897.
Article
24. Das AK, Goswami A. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J Med Syst. 2013; 37(3):9948.
Article
25. Kim KW, Lee JD. On the security of two remote user authentication schemes for telecare medical information systems. J Med Syst. 2014; 38(5):17.
Article
26. Das AK, Goswami A. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J Med Syst. 2014; 38(6):27.
Article
27. Shin M. Secure remote health monitoring with unreliable mobile devices. J Biomed Biotechnol. 2012; 2012:546021.
Article
28. Abie H, Balasingham I. Risk-based adaptive security for smart IoT in eHealth. In : Proceedings of the 7th International Conference on Body Area Networks; 2012 Sep 24-26; Oslo, Norway. p. 269–275.
29. Al-Haj A, Amer A. Secured telemedicine using region-based watermarking with tamper localization. J Digit Imaging. 2014; 27(6):737–750.
Article