Suivre
Sanaz Rahimi Moosavi
Sanaz Rahimi Moosavi
Adresse e-mail validée de csudh.edu - Page d'accueil
Titre
Citée par
Citée par
Année
SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways
SR Moosavi, TN Gia, AM Rahmani, E Nigussie, S Virtanen, J Isoaho, ...
Procedia Computer Science 52, 452-459, 2015
3462015
End-to-end security scheme for mobility enabled healthcare Internet of Things
SR Moosavi, TN Gia, E Nigussie, AM Rahmani, S Virtanen, H Tenhunen, ...
Future Generation Computer Systems 64, 108-124, 2016
3262016
On the feasibility of attribute-based encryption on internet of things devices
M Ambrosin, A Anzanpour, M Conti, T Dargahi, SR Moosavi, AM Rahmani, ...
IEEE Micro 36 (6), 25-35, 2016
1422016
Performance analysis of end-to-end security schemes in healthcare IoT
SR Moosavi, E Nigussie, M Levorato, S Virtanen, J Isoaho
Procedia computer science 130, 432-439, 2018
582018
An elliptic curve-based mutual authentication scheme for RFID implant systems
SR Moosavi, E Nigussie, S Virtanen, J Isoaho
Procedia Computer Science 32, 198-206, 2014
572014
Session resumption-based end-to-end security for healthcare internet-of-things
SR Moosavi, TN Gia, E Nigussie, AM Rahmani, S Virtanen, H Tenhunen, ...
2015 IEEE International Conference on Computer and Information Technology …, 2015
542015
Pervasive health monitoring based on internet of things: Two case studies
SR Moosavi, AM Rahmani, T Westerlund, G Yang, P Liljeberg, ...
2014 4th International Conference on Wireless Mobile Communication and …, 2014
412014
Cryptographic key generation using ECG signal
SR Moosavi, E Nigussie, S Virtanen, J Isoaho
2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2017
402017
Low-latency approach for secure ECG feature based cryptographic key generation
SR Moosavi, E Nigussie, M Levorato, S Virtanen, J Isoaho
IEEE Access 6, 428-442, 2017
372017
A lightweight blockchain and fog-enabled secure remote patient monitoring system
O Cheikhrouhou, K Mershad, F Jamil, R Mahmud, A Koubaa, SR Moosavi
Internet of Things 22, 100691, 2023
362023
An efficient implementation of Hamiltonian path based multicast routing for 3D interconnection networks
SR Moosavi, AM Rahmani, P Liljeberg, J Plosila, H Tenhunen
2013 21st Iranian Conference on Electrical Engineering (ICEE), 1-6, 2013
92013
Enhancing performance of 3D interconnection networks using efficient multicast communication protocol
SR Moosavi, AM Rahmani, P Liljeberg, J Plosila, H Tenhunen
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
92013
PPG-KeyGen: using photoplethysmogram for key generation in wearable devices
SR Moosavi
Procedia Computer Science 184, 291-298, 2021
62021
Specification analysis for secure RFID implant systems
SR Moosavi, A Hakkala, J Isoaho, S Virtanen, J Isoaho
International Journal of Computer Theory and Engineering 6 (2), 177, 2014
62014
Secondary use of electronic health records: Availability aspects in two Nordic countries
A Vikström, H Moen, SR Moosavi, T Salakoski, S Salanterä
Health Information Management Journal 48 (3), 144-151, 2019
42019
End-to-end security scheme for e-Health systems using DNA-based ECC
SR Moosavi, A Izadifar
Silicon Valley Cybersecurity Conference, 77-89, 2021
32021
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive …
SR Moosavi, TN Gia, E Nigussie, AM Rahmani, S Virtanen, H Tenhunen
22015
An efficient history-based routing algorithm for interconnection networks
SR Moosavi, CY Chang, AM Rahmani, J Plosila, KL Man, TT Jeong, ...
2012 International SoC Design Conference (ISOCC), 277-280, 2012
22012
Factors affecting the availability of electronic patient records for secondary purposes–a case study
A Vikström, SR Moosavi, H Moen, T Salakoski, S Salanterä
Building Sustainable Health Ecosystems: 6th International Conference on Well …, 2016
12016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–19