Skip to main content
Erschienen in: Electronic Commerce Research 3/2019

12.03.2018

Towards a cooperative security system for mobile-health applications

verfasst von: Bruno M. C. Silva, Joel J. P. C. Rodrigues, Fábio Canelo, Ivo M. C. Lopes, Jaime Lloret

Erschienen in: Electronic Commerce Research | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile health (m-Health) system architectures are typically based on mobile and wireless communications, and use mobile devices with data exchange supported by Web services (WS). Although m-Health systems offer mobility as a potential and precious resource they also present several challenged issues and constraints, such as, battery and storage capacity, broadcast constraints, interferences, disconnections, noises, limited bandwidths, and network delays. Furthermore, constant mobility and often-required Internet connectivity also exposes and compromises the privacy and confidentiality of the m-Health system information. This paper proposes a novel data encryption solution for mobile health systems, considering a novel and early-proposed cooperation strategy. This encryption solution, tries to guarantee the best confidentiality, integrity, and authenticity of m-Health systems users data. The paper also presents a performance evaluation study comparing the performance an m-Health application with and without the DE4MHA.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akter, S., D’Ambra, J., & Ray, P. (2010). User perceived service quality of mHealth services in developing countries. In European conference on information systems (ECIS 2010), South Africa, June 6–9, 2010 (pp 1–12). Akter, S., D’Ambra, J., & Ray, P. (2010). User perceived service quality of mHealth services in developing countries. In European conference on information systems (ECIS 2010), South Africa, June 6–9, 2010 (pp 1–12).
2.
Zurück zum Zitat Akter, S., & Ray, P. (2010). mHealth—An ultimate platform to serve the unserved. IMIA yearbook of medical informatics—Biomedical informatics: Building capacity worldwide (pp. 94–100). Stuttgart: Schattauer. Akter, S., & Ray, P. (2010). mHealth—An ultimate platform to serve the unserved. IMIA yearbook of medical informatics—Biomedical informatics: Building capacity worldwide (pp. 94–100). Stuttgart: Schattauer.
3.
Zurück zum Zitat Antoniou, G., & Batten, L. (2011). e-Commerce: Protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11(4), 421–456.CrossRef Antoniou, G., & Batten, L. (2011). e-Commerce: Protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11(4), 421–456.CrossRef
4.
Zurück zum Zitat Agrawal, M., & Mishra, P. (2012). A comparative survey on symmetric key encryption techniques. International Journal on Computer Science and Engineering, 4, 877–882. Agrawal, M., & Mishra, P. (2012). A comparative survey on symmetric key encryption techniques. International Journal on Computer Science and Engineering, 4, 877–882.
5.
Zurück zum Zitat Bannon, L., & Hughes, J. (1993). The context of CSCW. In K. Schmidt (Ed.), Report of COST14 “CoTech”. Working Group 4 (1991–1992). Bannon, L., & Hughes, J. (1993). The context of CSCW. In K. Schmidt (Ed.), Report of COST14 “CoTech”. Working Group 4 (1991–1992).
7.
Zurück zum Zitat Biryukov, A., Nakahara, J., Preneel, B., & Vandewalle, J. (2002). New weak key classes of IDEA. Lecture Notes in Computer Science (Vol. 2513, pp. 315–326). Biryukov, A., Nakahara, J., Preneel, B., & Vandewalle, J. (2002). New weak key classes of IDEA. Lecture Notes in Computer Science (Vol. 2513, pp. 315–326).
8.
Zurück zum Zitat Biswas, G. (2008). Diffie–Hellman technique: Extended to multiple two-party keys and one multi-party key. IET Information Security, 2(1), 12–18.CrossRef Biswas, G. (2008). Diffie–Hellman technique: Extended to multiple two-party keys and one multi-party key. IET Information Security, 2(1), 12–18.CrossRef
9.
Zurück zum Zitat Bleumer, G. (1994). Security for decentralized health information systems. International Journal of Bio-Medical Computing, 35, 139–145. Bleumer, G. (1994). Security for decentralized health information systems. International Journal of Bio-Medical Computing, 35, 139–145.
10.
Zurück zum Zitat Boonyarattaphan, A., Bai, Y., Chung, S. (2009). A security framework for e-Health service authentication and e-Health data transmission. In 9th international symposium on communications and information technology (ISCIT 2009), September 28–29 (pp. 1213–1218). Boonyarattaphan, A., Bai, Y., Chung, S. (2009). A security framework for e-Health service authentication and e-Health data transmission. In 9th international symposium on communications and information technology (ISCIT 2009), September 28–29 (pp. 1213–1218).
11.
Zurück zum Zitat Buttyán, L., & Hubaux, J.-P. (2003). Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications, 8(5), 579–592.CrossRef Buttyán, L., & Hubaux, J.-P. (2003). Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications, 8(5), 579–592.CrossRef
12.
Zurück zum Zitat Chan, V., Ray, P., & Parameswaran, N. (2008). Mobile e-Health monitoring: An agent-based approach. IET Communications, 2(2), 223–230.CrossRef Chan, V., Ray, P., & Parameswaran, N. (2008). Mobile e-Health monitoring: An agent-based approach. IET Communications, 2(2), 223–230.CrossRef
14.
Zurück zum Zitat Chen, Y., & Ku, W. (2009). Self-encryption scheme for data security in mobile devices. In Proceedings of the 6th IEEE conference on consumer communications and networking conference (pp. 850–854). Chen, Y., & Ku, W. (2009). Self-encryption scheme for data security in mobile devices. In Proceedings of the 6th IEEE conference on consumer communications and networking conference (pp. 850–854).
15.
Zurück zum Zitat Cochran, M. (2008). Cryptographic hash functions. Ann Arbor: ProQuest. Cochran, M. (2008). Cryptographic hash functions. Ann Arbor: ProQuest.
16.
Zurück zum Zitat Cubic, I., Markota, I., & Benc, I. (2010). Application of session initiation protocol in mobile health systems. In Proceedings of the 33rd international convention MIPRO. Opatija, Croatia, May 24–28 (pp. 367–371). Cubic, I., Markota, I., & Benc, I. (2010). Application of session initiation protocol in mobile health systems. In Proceedings of the 33rd international convention MIPRO. Opatija, Croatia, May 24–28 (pp. 367–371).
17.
18.
Zurück zum Zitat Diffie, W. (1988). The first ten years of public-key cryptography. Proceedings of the IEEE, 76(5), 560–577.CrossRef Diffie, W. (1988). The first ten years of public-key cryptography. Proceedings of the IEEE, 76(5), 560–577.CrossRef
20.
Zurück zum Zitat Elgamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469–472.CrossRef Elgamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4), 469–472.CrossRef
21.
Zurück zum Zitat Fayn, J., & Rubel, P. (2010). Towards a personal health society in cardiology. IEEE Transactions on Information Technology in Biomedicine, 14(2), 401–409.CrossRef Fayn, J., & Rubel, P. (2010). Towards a personal health society in cardiology. IEEE Transactions on Information Technology in Biomedicine, 14(2), 401–409.CrossRef
23.
Zurück zum Zitat Ferguson, N., Schneier, B., & Kohno, T. (2012). Cryptography engineering. Hoboken: Wiley. ISBN 978-0-470-47424-2. Ferguson, N., Schneier, B., & Kohno, T. (2012). Cryptography engineering. Hoboken: Wiley. ISBN 978-0-470-47424-2.
24.
Zurück zum Zitat Goldreich, O. (2005). Foundations of cryptography. Hanover: Now Publishers Inc. Goldreich, O. (2005). Foundations of cryptography. Hanover: Now Publishers Inc.
26.
Zurück zum Zitat Gupta, A. (2008). Challenges of mobile computing. In Proceedings of 2nd national conference on challenges and opportunities in information technology, March 29 (pp. 86–90). Gupta, A. (2008). Challenges of mobile computing. In Proceedings of 2nd national conference on challenges and opportunities in information technology, March 29 (pp. 86–90).
28.
Zurück zum Zitat Istepanian, R., & Lacal, J. (2003). Emerging mobile communication technologies for health: Some imperative notes on m-Health. In Proceedings of the 25th annual international conference of the IEEE Engineering in Medicine and Biology Society (Vol. 2, pp. 1414–1416). Istepanian, R., & Lacal, J. (2003). Emerging mobile communication technologies for health: Some imperative notes on m-Health. In Proceedings of the 25th annual international conference of the IEEE Engineering in Medicine and Biology Society (Vol. 2, pp. 1414–1416).
29.
Zurück zum Zitat Isaac, J. T., Zeadally, S., & Cámara, J. S. (2012). A lightweight secure mobile payment protocol for vehicular ad-hoc networks (VANETs). Electronic Commerce Research, 12(1), 97–123.CrossRef Isaac, J. T., Zeadally, S., & Cámara, J. S. (2012). A lightweight secure mobile payment protocol for vehicular ad-hoc networks (VANETs). Electronic Commerce Research, 12(1), 97–123.CrossRef
31.
Zurück zum Zitat Jara, A., Zamora, M., & Skarmeta, A. (2011). An Internet of things-based personal device for diabetes therapy management in ambient assisted living (AAL). Personal and Ubiquitous Computing, 15(4), 431–440.CrossRef Jara, A., Zamora, M., & Skarmeta, A. (2011). An Internet of things-based personal device for diabetes therapy management in ambient assisted living (AAL). Personal and Ubiquitous Computing, 15(4), 431–440.CrossRef
33.
Zurück zum Zitat Kramer, G., Maric, I., & Yates, R. D. (2007). Cooperative communications (foundations and trends in networking). Hanover: Now Publishers Inc. Kramer, G., Maric, I., & Yates, R. D. (2007). Cooperative communications (foundations and trends in networking). Hanover: Now Publishers Inc.
34.
Zurück zum Zitat Kollmann, A., Riedl, M., Kastner, P., Schreier, G., & Ludvik, B. (2007). Feasibility of a mobile phone-based data service for functional insulin treatment of type 1 diabetes mellitus patients. Journal of Medical Internet Research, 9(5) e36. http://www.jmir.org/2007/5/e36/. Kollmann, A., Riedl, M., Kastner, P., Schreier, G., & Ludvik, B. (2007). Feasibility of a mobile phone-based data service for functional insulin treatment of type 1 diabetes mellitus patients. Journal of Medical Internet Research, 9(5) e36. http://​www.​jmir.​org/​2007/​5/​e36/​.
35.
Zurück zum Zitat Koukopoulos, D., & Styliaras, G. (2013). Design of trustworthy smartphone-based multimedia services in cultural environments. Electronic Commerce Research, 13(2), 129–150.CrossRef Koukopoulos, D., & Styliaras, G. (2013). Design of trustworthy smartphone-based multimedia services in cultural environments. Electronic Commerce Research, 13(2), 129–150.CrossRef
37.
Zurück zum Zitat Laxminarayan, S., Istepanian, R., & Pattichis, C. S. (2006). m-Health: Emerging mobile health systems. Berlin: Springer. Laxminarayan, S., Istepanian, R., & Pattichis, C. S. (2006). m-Health: Emerging mobile health systems. Berlin: Springer.
38.
Zurück zum Zitat Lin, C. T., Chang, K. C., Lin, C. L., Chiang, C. C., Lu, S. W., Chang, S. S., et al. (2010). An intelligent telecardiology system using a wearable and wireless ECG to detect atrial fibrillation. IEEE Transactions on Information Technology in Biomedicine, 14(3), 726–733.CrossRef Lin, C. T., Chang, K. C., Lin, C. L., Chiang, C. C., Lu, S. W., Chang, S. S., et al. (2010). An intelligent telecardiology system using a wearable and wireless ECG to detect atrial fibrillation. IEEE Transactions on Information Technology in Biomedicine, 14(3), 726–733.CrossRef
40.
Zurück zum Zitat Moullee, B., & Ray, P. (2009). Issues in e-Health cost impact assessment. In IFMBE proceeding of the world congress on medical physics and biomedical engineering (pp. 223–226). Berlin: Springer. Moullee, B., & Ray, P. (2009). Issues in e-Health cost impact assessment. In IFMBE proceeding of the world congress on medical physics and biomedical engineering (pp. 223–226). Berlin: Springer.
41.
Zurück zum Zitat Mougiakakou, S., Bartsocas, C., Bozas, E., Chaniotakis, N., Iliopoulou, D., Kouris, I., et al. (2010). SMARTDIAB: A communication and information technology approach for the intelligent monitoring, management and follow-up of type 1 diabetes patients. IEEE Transactions on Information Technology in Biomedicine, 14(3), 622–633.CrossRef Mougiakakou, S., Bartsocas, C., Bozas, E., Chaniotakis, N., Iliopoulou, D., Kouris, I., et al. (2010). SMARTDIAB: A communication and information technology approach for the intelligent monitoring, management and follow-up of type 1 diabetes patients. IEEE Transactions on Information Technology in Biomedicine, 14(3), 622–633.CrossRef
42.
Zurück zum Zitat Paar, C., & Pelzl, J. (2010). The data encryption standard (DES) and alternatives. Understanding cryptography. A textbook for students and practitioners (pp. 55–86). Berlin: Springer. Paar, C., & Pelzl, J. (2010). The data encryption standard (DES) and alternatives. Understanding cryptography. A textbook for students and practitioners (pp. 55–86). Berlin: Springer.
43.
Zurück zum Zitat Pachghare, V. K. (2009). Cryptography and information security. New Delhi: PHI Learning Pvt. Ltd. ISBN 978-81-203-3521-9. Pachghare, V. K. (2009). Cryptography and information security. New Delhi: PHI Learning Pvt. Ltd. ISBN 978-81-203-3521-9.
44.
Zurück zum Zitat Pare, G., Moqadem, K., Pineau, G., & St-Hilaire, C. (2010). Clinical effects of home telemonitoring in the context of diabetes, asthma, heart failure and hypertension: a systematic review. Journal of Medical Internet Research, 12(2), e21. http://www.jmir.org/2010/2/e21/. Pare, G., Moqadem, K., Pineau, G., & St-Hilaire, C. (2010). Clinical effects of home telemonitoring in the context of diabetes, asthma, heart failure and hypertension: a systematic review. Journal of Medical Internet Research, 12(2), e21. http://​www.​jmir.​org/​2010/​2/​e21/​.
45.
46.
Zurück zum Zitat Pollak, J., Gay, G., Byrne, S., Wagner, E., Retelny, D., & Humphreys, L. (2010). It’s time to eat! Using mobile games to promote healthy eating. IEEE Pervasive Computing, 9(2), 21–27.CrossRef Pollak, J., Gay, G., Byrne, S., Wagner, E., Retelny, D., & Humphreys, L. (2010). It’s time to eat! Using mobile games to promote healthy eating. IEEE Pervasive Computing, 9(2), 21–27.CrossRef
49.
Zurück zum Zitat Ray, P., Parameswaran, N., Chan, V., & Yu, W. (2008). Awareness modeling in collaborative mobile e-Health. Journal of Telemedine and Telecare, 14(7), 381–385.CrossRef Ray, P., Parameswaran, N., Chan, V., & Yu, W. (2008). Awareness modeling in collaborative mobile e-Health. Journal of Telemedine and Telecare, 14(7), 381–385.CrossRef
50.
Zurück zum Zitat Raychaudhuri, K., & Ray, P. (2010). Privacy challenges in the use of eHealth systems for public health management. International Journal of e-Health and Medical Communications, 1(2), 12–23.CrossRef Raychaudhuri, K., & Ray, P. (2010). Privacy challenges in the use of eHealth systems for public health management. International Journal of e-Health and Medical Communications, 1(2), 12–23.CrossRef
52.
Zurück zum Zitat Rodrigues, J., Oliveira, M., & Vaidya, B. (2010). New trends on ubiquitous mobile multimedia applications. EURASIP Journal on Wireless Communications and Networking, 2010(10), 1–12. Rodrigues, J., Oliveira, M., & Vaidya, B. (2010). New trends on ubiquitous mobile multimedia applications. EURASIP Journal on Wireless Communications and Networking, 2010(10), 1–12.
53.
Zurück zum Zitat Rodrigues, J., Lopes, I., Silva, B., & Torre, I. (2013). A new mobile ubiquitous computing application to control obesity: SapoFit. Informatics for Health and Social Care, 38(1), 37–53.CrossRef Rodrigues, J., Lopes, I., Silva, B., & Torre, I. (2013). A new mobile ubiquitous computing application to control obesity: SapoFit. Informatics for Health and Social Care, 38(1), 37–53.CrossRef
55.
Zurück zum Zitat Schneier, B. (1994). The Blowfish encryption algorithm. Dr Dobb’s Journal-Software Tools for the Professional Programmer, 19(4), 38–43. Schneier, B. (1994). The Blowfish encryption algorithm. Dr Dobb’s Journal-Software Tools for the Professional Programmer, 19(4), 38–43.
56.
Zurück zum Zitat Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley. Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.
57.
Zurück zum Zitat Shanmugam, M., Thiruvengadam, S., Khurat, A., & Maglogiannis, I. (2006). Enabling secure mobile access for electronic health care applications. In Pervasive health conference and workshops, Innsbruck, Austria, November 29 to December 1 (pp. 1–8). Shanmugam, M., Thiruvengadam, S., Khurat, A., & Maglogiannis, I. (2006). Enabling secure mobile access for electronic health care applications. In Pervasive health conference and workshops, Innsbruck, Austria, November 29 to December 1 (pp. 1–8).
58.
Zurück zum Zitat Silva, B. M. C., Rodrigues, J. J. P. C., Lopes, I. M. C., Machado, T. M. F., & Zhou, L. (2013). A novel cooperation strategy for mobile health applications. IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Emerging Technologies in Communications - eHealth, IEEE Communications Society, 31(9), 28–36. https://doi.org/10.1109/JSAC.2013.SUP.0513003.CrossRef Silva, B. M. C., Rodrigues, J. J. P. C., Lopes, I. M. C., Machado, T. M. F., & Zhou, L. (2013). A novel cooperation strategy for mobile health applications. IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Emerging Technologies in Communications - eHealth, IEEE Communications Society, 31(9), 28–36. https://​doi.​org/​10.​1109/​JSAC.​2013.​SUP.​0513003.CrossRef
59.
Zurück zum Zitat Silva, B., Lopes, I., Rodrigues, J., & Ray, P. (2011). SapoFitness: A mobile health application for dietary evaluation. In 13th IEEE international conference on e-Health networking applications and services (Healthcom 2011), Columbia, Missouri, USA, June 13–15 (pp. 375–380). Silva, B., Lopes, I., Rodrigues, J., & Ray, P. (2011). SapoFitness: A mobile health application for dietary evaluation. In 13th IEEE international conference on e-Health networking applications and services (Healthcom 2011), Columbia, Missouri, USA, June 13–15 (pp. 375–380).
60.
Zurück zum Zitat Smith, R. (2005). Introduction to multilevel security. Handbook of information security. Hoboken: Wiley. Smith, R. (2005). Introduction to multilevel security. Handbook of information security. Hoboken: Wiley.
61.
Zurück zum Zitat Sulaiman, R., Sharma, D., Ma, W., & Tran, D. (2008). A security architecture for e-Health services. In 10th international conference on advanced communication technology, Gangwon-Do, South Korea (Vol. 2, pp. 99–104). Sulaiman, R., Sharma, D., Ma, W., & Tran, D. (2008). A security architecture for e-Health services. In 10th international conference on advanced communication technology, Gangwon-Do, South Korea (Vol. 2, pp. 99–104).
62.
Zurück zum Zitat Tachakra, S., Wang, X., Istepanian, R., & Song, Y. (2003). Mobile e-Health: The unwired evolution of telemedicine. Telemedicine Journal and e-Health, 9(3), 247–257.CrossRef Tachakra, S., Wang, X., Istepanian, R., & Song, Y. (2003). Mobile e-Health: The unwired evolution of telemedicine. Telemedicine Journal and e-Health, 9(3), 247–257.CrossRef
63.
Zurück zum Zitat Tillich, S., & Herbst, C. (2008). Attacking state-of-the-art software countermeasures—A case study for AES. In Proceedings of the 10th international workshop on cryptographic hardware and embedded systems, Washington, DC, USA, August 10–13 (pp. 228–243). Tillich, S., & Herbst, C. (2008). Attacking state-of-the-art software countermeasures—A case study for AES. In Proceedings of the 10th international workshop on cryptographic hardware and embedded systems, Washington, DC, USA, August 10–13 (pp. 228–243).
64.
Zurück zum Zitat Watson, A., Bickmore, T., Cange, A., Kulshreshtha, A., & Kvedar, J. (2012). An internet-based virtual coach to promote physical activity adherence in overweight adults: randomized controlled trial. Journal of Medical Internet Research, 14(1), e1. http://www.jmir.org/2012/1/e1/. Watson, A., Bickmore, T., Cange, A., Kulshreshtha, A., & Kvedar, J. (2012). An internet-based virtual coach to promote physical activity adherence in overweight adults: randomized controlled trial. Journal of Medical Internet Research, 14(1), e1. http://​www.​jmir.​org/​2012/​1/​e1/​.
65.
Zurück zum Zitat Whittaker, R., Dorey, E., Bramley, D., Bullen, C., Denny, S., & Elley, C., et al. (2011). A theory-based video messaging mobile phone intervention for smoking cessation: randomized controlled trial. Journal of Medical Internet Research, 13(1), 1–12. http://www.jmir.org/2011/1/e10/. Whittaker, R., Dorey, E., Bramley, D., Bullen, C., Denny, S., & Elley, C., et al. (2011). A theory-based video messaging mobile phone intervention for smoking cessation: randomized controlled trial. Journal of Medical Internet Research, 13(1), 1–12. http://​www.​jmir.​org/​2011/​1/​e10/​.
66.
Zurück zum Zitat Yong-Xia, Z., & Ge, Z. (2010). MD5 research. In Second international conference on multimedia and information technology, Kaifeng, China, April 24–25 (Vol. 2, pp. 271–273). Yong-Xia, Z., & Ge, Z. (2010). MD5 research. In Second international conference on multimedia and information technology, Kaifeng, China, April 24–25 (Vol. 2, pp. 271–273).
67.
Zurück zum Zitat Zheng, P., & Ni, L. (2005). Smart phone and next generation mobile computing. San Francisco: Morgan Kaufmann. Zheng, P., & Ni, L. (2005). Smart phone and next generation mobile computing. San Francisco: Morgan Kaufmann.
68.
Zurück zum Zitat Zhu, F., Bosch, M., Woo, I., Kim, S., Boushey, C., Ebert, D., et al. (2010). The use of mobile devices in aiding dietary assessment and evaluation. IEEE Journal of Selected Topics in Signal Processing, 4(4), 756–766.CrossRef Zhu, F., Bosch, M., Woo, I., Kim, S., Boushey, C., Ebert, D., et al. (2010). The use of mobile devices in aiding dietary assessment and evaluation. IEEE Journal of Selected Topics in Signal Processing, 4(4), 756–766.CrossRef
Metadaten
Titel
Towards a cooperative security system for mobile-health applications
verfasst von
Bruno M. C. Silva
Joel J. P. C. Rodrigues
Fábio Canelo
Ivo M. C. Lopes
Jaime Lloret
Publikationsdatum
12.03.2018
Verlag
Springer US
Erschienen in
Electronic Commerce Research / Ausgabe 3/2019
Print ISSN: 1389-5753
Elektronische ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-018-9296-9

Weitere Artikel der Ausgabe 3/2019

Electronic Commerce Research 3/2019 Zur Ausgabe