Hard and soft security provisioning for computationally weak pervasive computing systems in E-health | IEEE Journals & Magazine | IEEE Xplore