{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:31:58Z","timestamp":1756636318445,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T00:00:00Z","timestamp":1606348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,26]]},"DOI":"10.1145\/3440749.3442596","type":"proceedings-article","created":{"date-parts":[[2021,5,13]],"date-time":"2021-05-13T21:44:37Z","timestamp":1620942277000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["IoT-Enabled Healthcare: Benefits, Issues and Challenges\u200f"],"prefix":"10.1145","author":[{"given":"Bassam","family":"Al-Shargabi","sequence":"first","affiliation":[{"name":"Middle East University"}]},{"given":"Simak","family":"Abuarqoub","sequence":"additional","affiliation":[{"name":"Liverpool John Moores University"}]}],"member":"320","published-online":{"date-parts":[[2021,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Internet of Things: An exploration study of opportunities and challenges,\" in 2017 International Conference on Engineering & MIS (ICEMIS)","author":"Al-Shargabi B.","year":"2017"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_2_1_3_1","article-title":"Secure and Reliable IoT Networks Using Fog Computing with Software-Defined Networking and Blockchain","volume":"02","author":"Muthanna A.","year":"2019","journal-title":"Journal of Sensor and Actuator Networks"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2437951"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5958\/0974-360X.2018.00580.2"},{"key":"e_1_3_2_1_6_1","first-page":"800","volume-title":"Intelligent Healthcare Using IoT:A Extensive Survey,\" in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)","author":"Gandhi D. A.","year":"2018"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.005"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.07.049"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2018.08.021"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/BLOC.2019.8751336","volume-title":"Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing,\" in 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","author":"Manzoor A.","year":"2019"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/978-981-13-0866-6_7","volume-title":"Secured Architecture for Internet of Things-Enabled Personalized Healthcare Systems,\" ed","author":"Neerugatti V.","year":"2019"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2013.07.001"},{"key":"e_1_3_2_1_13_1","article-title":"Behaviour Profiling in Healthcare Applications Using the Internet of Things Technology","volume":"6","author":"Abuarqoub A.","year":"2016","journal-title":"International Journal of Advances in Computer Science & Its Applications"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2417684"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102304.3109810"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126501"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.045"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2015.060601"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2174\/1874444301608010035"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.004"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4050-6"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.04.064"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2775180"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2020.2981558"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/jsan9010001"},{"key":"e_1_3_2_1_26_1","first-page":"153","volume-title":"Internet of Things-Based Healthcare: Recent Advances and Challenges,\" ed","author":"Shah S. T. U.","year":"2019"},{"key":"e_1_3_2_1_27_1","first-page":"14","article-title":"A Cultural E-Government Readiness Model","volume":"04","author":"Sabri A.","year":"2012","journal-title":"Intelligent Information Management Journal"},{"key":"e_1_3_2_1_28_1","first-page":"32","article-title":"A study of Adopting Cloud Computing from Enterprise Perspective using Delone and Mclean IS Success Model","volume":"14","author":"Al-Shargabi B.","year":"2016","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2832987.2833003"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISE.2016.17"}],"event":{"name":"ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems","acronym":"ICFNDS '20","location":"St.Petersburg Russian Federation"},"container-title":["The 4th International Conference on Future Networks and Distributed Systems (ICFNDS)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3440749.3442596","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3440749.3442596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:18Z","timestamp":1750195698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3440749.3442596"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,26]]},"references-count":30,"alternative-id":["10.1145\/3440749.3442596","10.1145\/3440749"],"URL":"https:\/\/doi.org\/10.1145\/3440749.3442596","relation":{},"subject":[],"published":{"date-parts":[[2020,11,26]]},"assertion":[{"value":"2021-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}