{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T06:52:39Z","timestamp":1759042359587},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2018,3,10]],"date-time":"2018-03-10T00:00:00Z","timestamp":1520640000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s00779-018-1128-3","type":"journal-article","created":{"date-parts":[[2018,3,10]],"date-time":"2018-03-10T14:28:11Z","timestamp":1520692091000},"page":"793-799","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["ECASS: an encryption compression aggregation security scheme for secure data transmission in ambient assisted living systems"],"prefix":"10.1007","volume":"23","author":[{"given":"Bacem","family":"Mbarek","sequence":"first","affiliation":[]},{"given":"Nafa\u00e2","family":"Jabeur","sequence":"additional","affiliation":[]},{"given":"Ansar-Ul-Haque","family":"Yasar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,10]]},"reference":[{"key":"1128_CR1","unstructured":"Dolan B 2.2m people using remote patient monitoring at the end of 2011. available online: \nhttp:\/\/mobihealthnews.com\/15487\/berg-2-2m-patients-remotely-monitored-globally\n\n (accessed on 18 november 2013). Tech. Rep."},{"key":"1128_CR2","unstructured":"Berg insight. mhealth and home monitoring. berg insight\u2019s m2m research series 2014. in \nhttp:\/\/www.berginsight.com\n\n, accessed November 15, 2015, p. 305 pages"},{"issue":"1","key":"1128_CR3","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","volume":"53","author":"D He","year":"2015","unstructured":"He D, Zeadally S (2015) Authentication protocol for an ambient assisted living system. IEEE Commun Mag 53(1):71\u201377","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"1128_CR4","doi-asserted-by":"publisher","first-page":"415","DOI":"10.5405\/jmbe.1478","volume":"33","author":"C-K Yeh","year":"2013","unstructured":"Yeh C-K, Chen H-M, Lo J-W (2013) An authentication protocol for ubiquitous health monitoring systems. Journal of Medical and Biological Engineering 33(4):415\u2013419","journal-title":"Journal of Medical and Biological Engineering"},{"key":"1128_CR5","first-page":"17","volume":"1","author":"M Li","year":"2010","unstructured":"Li M, Lou W, Ren K (2010) Data security and privacy in wireless body area networks. IEEE Wirel Commun 1:17","journal-title":"IEEE Wirel Commun"},{"issue":"15","key":"1128_CR6","doi-asserted-by":"publisher","first-page":"2643","DOI":"10.1002\/sec.1214","volume":"9","author":"X Li","year":"2016","unstructured":"Li X, Niu J, Kumari S, Liao J, Liang W, Khan MK (2016) A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Security and Communication Networks 9(15):2643\u20132655","journal-title":"Security and Communication Networks"},{"key":"1128_CR7","first-page":"411","volume":"3","author":"S Sahaa","year":"2013","unstructured":"Sahaa S, Tomar SK (2013) Issues in transmitting physical health information in m-healthcare. Int J Curr Eng Technol 3:411\u2013 413","journal-title":"Int J Curr Eng Technol"},{"issue":"4","key":"1128_CR8","doi-asserted-by":"publisher","first-page":"2609","DOI":"10.1007\/s10916-011-9735-9","volume":"36","author":"Q Pu","year":"2012","unstructured":"Pu Q, Wang J, Zhao R (2012) Strong authentication scheme for telecare medicine information systems. J Med Syst 36(4):2609\u20132619","journal-title":"J Med Syst"},{"key":"1128_CR9","doi-asserted-by":"crossref","unstructured":"Mbarek B, Meddeb A, Jabalah W, Mosbah M (2016) A broadcast authentication scheme in iot environments. In: IEEE\/ACS 13th international conference on computer systems and applications (AICCSA). IEEE, Piscataway, pp 1\u20136","DOI":"10.1109\/AICCSA.2016.7945807"},{"issue":"6","key":"1128_CR10","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/TITB.2009.2033055","volume":"13","author":"CC Tan","year":"2009","unstructured":"Tan CC, Wang H, Zhong S, Li Q (2009) Ibe-lite: a lightweight identity-based cryptography for body sensor networks. IEEE Trans Inf Technol Biomed 13(6):926\u2013932","journal-title":"IEEE Trans Inf Technol Biomed"},{"key":"1128_CR11","first-page":"25","volume":"3","author":"L Zhou","year":"2011","unstructured":"Zhou L, Chao H-C (2011) Multimedia traffic security architecture for the internet of things. IEEE Netw 3:25","journal-title":"IEEE Netw"},{"issue":"2","key":"1128_CR12","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1109\/TPDS.2013.145","volume":"25","author":"J Liu","year":"2014","unstructured":"Liu J, Zhang Z, Chen X, Kwak KS (2014) Certificateless remote anonymous authentication schemes for wirelessbody area networks. IEEE Trans Parallel Distrib Syst 25(2):332\u2013342","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"3","key":"1128_CR13","doi-asserted-by":"publisher","first-page":"355","DOI":"10.4304\/jnw.6.3.355-364","volume":"6","author":"XH Le","year":"2011","unstructured":"Le XH, Khalid M, Sankar R, Lee S (2011) An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J Networks 6(3):355\u2013364","journal-title":"J Networks"},{"key":"1128_CR14","first-page":"27","volume":"4","author":"Y-M Huang","year":"2009","unstructured":"Huang Y-M, Hsieh M-Y, Chao H-C, Hung S-H, Park JH (2009) Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE J Sel Areas Commun 4:27","journal-title":"IEEE J Sel Areas Commun"},{"key":"1128_CR15","unstructured":"Zhang Z-K, Cho MCY, Wang C-W, Hsu C-W, Chen C-K, Shieh S (2014) Iot security: ongoing challenges and research opportunities. In: 2014 IEEE 7th international conference on service-oriented computing and applications. IEEE, Piscataway, pp 230\u2013234"},{"key":"1128_CR16","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 92","author":"Carlo Blundo","year":"1993","unstructured":"Blundo C, De Santis A, Herzberg A, Kutten S, Vaccaro U, Yung M (1992) Perfectly-secure key distribution for dynamic conferences. In: Annual international cryptology conference. Springer, Berlin, pp 471\u2013486"},{"issue":"3","key":"1128_CR17","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/JSSC.2011.2179451","volume":"47","author":"F Chen","year":"2012","unstructured":"Chen F, Chandrakasan AP, Stojanovic VM (2012) Design and analysis of a hardware-efficient compressed sensing architecture for data compression in wireless sensors. IEEE J Solid State Circuits 47(3):744\u2013756","journal-title":"IEEE J Solid State Circuits"},{"issue":"18","key":"1128_CR18","doi-asserted-by":"publisher","first-page":"4491","DOI":"10.1109\/TSP.2013.2271480","volume":"61","author":"G Yang","year":"2013","unstructured":"Yang G, Tan VY, Ho CK, Ting SH, Guan YL (2013) Wireless compressive sensing for energy harvesting sensor nodes. IEEE Trans Signal Process 61(18):4491\u20134505","journal-title":"IEEE Trans Signal Process"},{"issue":"3","key":"1128_CR19","doi-asserted-by":"publisher","first-page":"1764","DOI":"10.1109\/TII.2013.2245334","volume":"9","author":"S Li","year":"2013","unstructured":"Li S, Da Xu L, Wang X (2013) A continuous biomedical signal acquisition system based on compressed sensing in body sensor networks. IEEE Trans Ind Inf 9(3):1764\u20131771","journal-title":"IEEE Trans Ind Inf"},{"key":"1128_CR20","unstructured":"Baraniuk R, Davenport MA, Duarte MF, Hegde C et al (2011) An introduction to compressive sensing, Connexions e-textbook"},{"key":"1128_CR21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511794308","volume-title":"Compressed sensing: theory and applications","author":"YC Eldar","year":"2012","unstructured":"Eldar YC, Kutyniok G (2012) Compressed sensing: theory and applications. Cambridge University Press, Cambridge"},{"issue":"3","key":"1128_CR22","first-page":"168","volume":"6","author":"N Hamid","year":"2012","unstructured":"Hamid N, Yahya A, Ahmad RB, Al-Qershi OM (2012) Image steganography techniques: an overview. Int J Comput Sci Secur (IJCSS) 6(3):168\u2013187","journal-title":"Int J Comput Sci Secur (IJCSS)"},{"key":"1128_CR23","doi-asserted-by":"crossref","unstructured":"Ostlin A, Pagh R (2003) Uniform hashing in constant time and linear space. In: Proceedings of the Thirty-fifth annual ACM symposium on theory of computing. ACM, New York, pp 622\u2013628","DOI":"10.1145\/780542.780633"},{"key":"1128_CR24","doi-asserted-by":"crossref","unstructured":"Downard IT (2004) Simulating sensor networks in ns-2, DTIC Document, Tech Rep.","DOI":"10.21236\/ADA423595"},{"issue":"1","key":"1128_CR25","first-page":"15","volume":"5","author":"A Kamilaris","year":"2012","unstructured":"Kamilaris A, Tofis Y, Bekara C, Pitsillides A, Kyriakides E (2012) Integrating web-enabled energy-aware smart homes to the smart grid. International Journal On Advances in Intelligent Systems 5(1):15\u201331","journal-title":"International Journal On Advances in Intelligent Systems"},{"key":"1128_CR26","first-page":"529","volume":"41","author":"F Amin","year":"2008","unstructured":"Amin F, Jahangir A, Rasifard H (2008) Analysis of public-key cryptography for wireless sensor networks security. World Acad Sci Eng Technol 41:529\u2013534","journal-title":"World Acad Sci Eng Technol"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-018-1128-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-018-1128-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-018-1128-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,19]],"date-time":"2019-11-19T04:11:02Z","timestamp":1574136662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-018-1128-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,10]]},"references-count":26,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["1128"],"URL":"https:\/\/doi.org\/10.1007\/s00779-018-1128-3","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,3,10]]},"assertion":[{"value":"23 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}