{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:18:09Z","timestamp":1758892689945,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1109\/camad52502.2021.9617795","type":"proceedings-article","created":{"date-parts":[[2021,12,6]],"date-time":"2021-12-06T21:23:44Z","timestamp":1638825824000},"page":"1-6","source":"Crossref","is-referenced-by-count":13,"title":["Robust Encryption to Enhance IoT Confidentiality for Healthcare Ecosystems"],"prefix":"10.1109","author":[{"given":"Andreou","family":"Andreas","sequence":"first","affiliation":[]},{"given":"Constandinos X.","family":"Mavromoustakis","sequence":"additional","affiliation":[]},{"given":"George","family":"Mastorakis","sequence":"additional","affiliation":[]},{"given":"Jordi Mongay","family":"Batalla","sequence":"additional","affiliation":[]},{"given":"John N.","family":"Sahalos","sequence":"additional","affiliation":[]},{"given":"Evangelos","family":"Pallis","sequence":"additional","affiliation":[]},{"given":"Evangelos","family":"Markakis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151345"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700364"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WTS48268.2020.9198715"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3013250"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09706-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700600"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-394812-0.00011-5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2989327"},{"key":"ref18","article-title":"Modified Machine Learning Technique for Curve Fitting on Regression Models for COVID-19 projections","author":"andreas","year":"2020","journal-title":"IEEE 25th International Workshop on Computer-Aided Modeling and Design of Communication Links and Networks (CAMAD)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-67731-2_44"},{"journal-title":"A common path to safe and sustained re-opening","year":"2021","key":"ref4"},{"journal-title":"Report of the Joint Cybersecurity Advisory Ransomware Activity Targeting the Healthcare and Public Health Sector","year":"2020","key":"ref3"},{"key":"ref6","article-title":"A Hybridized Measurement Methodology for Different Wavelet Transformations Targeting Medical Images in Internet of Things (IoT) Infrastructures","volume":"148","author":"alshayeh","year":"2019","journal-title":"Measurement"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10827-x"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/pharmacy9010017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761382"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CogInfoCom50765.2020.9237852"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET45539.2019.9032844"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSTARS.2021.3050166"}],"event":{"name":"2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","start":{"date-parts":[[2021,10,25]]},"location":"Porto, Portugal","end":{"date-parts":[[2021,10,27]]}},"container-title":["2021 IEEE 26th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9617743\/9617763\/09617795.pdf?arnumber=9617795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:53:13Z","timestamp":1652201593000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9617795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/camad52502.2021.9617795","relation":{},"subject":[],"published":{"date-parts":[[2021,10]]}}}