[1] Hassen, Hafedh Ben, Nadia Ayari, and Belgacem Hamdi. "A home hospitalization system based on the Internet of things, Fog computing and cloud computing." Informatics in Medicine Unlocked, vol. 20, pp. 136-148, 2020.
[2] Tuli, Shreshth, Nipam Basumatary, Sukhpal Singh Gill, Mohsen Kahani, Rajesh Chand Arya, Gurpreet Singh Wander, and Rajkumar Buyya. "HealthFog: An ensemble deep learning based Smart Healthcare System for Automatic Diagnosis of Heart Diseases in integrated IoT and fog computing " Future Generation Computer Systems, vol. 104, pp. 187-200, 2020.
[3] Karthika, P., R. Ganesh Babu, and P. A. Karthik. "Fog computing using interoperability and IoT security issues in health care." In Springer Micro-Electronics and Telecommunication Engineering, 97-105., 2020.
[4] Rincon, Jaime A., Solanye Guerra-Ojeda, Carlos Carrascosa, and Vicente Julian. "An IoT and Fog Computing-Based Monitoring System for Cardiovascular Patients with Automatic ECG Classification Using Deep Neural Networks." Sensors, vol. 20, no. 24, pp. 735-746, 2020.
[5] Bradley, D., Russell, D., Ferguson, I., Isaacs, J., MacLeod, A., & White, R. (2015). The Internet of Things–The future or the end of mechatronics. Mechatronics, 27, 57-74.
[6] Bonomi, F., Milito, R., Natarajan, P., & Zhu, J. (2014). Fog computing: A platform for internet of things and analytics. In Big data and internet of things: A roadmap for smart environments (pp. 169-186). Springer, Cham.
[7] Shammar EA, Zahary AT, Al-Shargabi AA. A survey of IoT and blockchain integration: Security perspective. IEEE Access. 2021 Nov 19;9:156114-50.
[8] Sultan A, Mushtaq MA, Abubakar M. IOT security issues via blockchain: a review paper. InProceedings of the 2019 international conference on blockchain technology 2019 Mar 15 (pp. 60-65).
[9] Shammar EA, Zahary AT, Al-Shargabi AA. A survey of IoT and blockchain integration: Security perspective. IEEE Access. 2021 Nov 19;9:156114-50.
[10] Uckelmann, D., Harrison, M., & Michahelles, F. (Eds.). (2011). Architecting the internet of things. Springer Science & Business Media.
[11] Mosenia, A., & Jha, N. K. (2017). A comprehensive study of security of internet-of-things. IEEE Transactions on Emerging Topics in Computing, 5(4), 586-602.
[12] Banerjee M, Lee J, Choo KK. A blockchain future for internet of things security: a position paper. Digital Communications and Networks. 2018 Aug 1;4(3):149-60.
[13] Hafsa A, Sghaier A, Malek J, Machhout M. Image encryption method based on improved ECC and modified AES algorithm. Multimedia Tools and Applications. 2021 May;80:19769-801.
[14] Hafsa A, Sghaier A, Zeghid M, Malek J, Machhout M. An improved co-designed AES-ECC cryptosystem for secure data transmission. International Journal of Information and Computer Security. 2020;13(1):118-40.
[15] JR MN, Lutimath NM. AN ENHANCED AES-ECC MODEL FOR THE SECURITY OF MOBILE APPLICATIONS USING CLOUD COMPUTING. Computer Integrated Manufacturing Systems. 2023 Apr 16;29(4):116-27.
[16] Smith J, Fathima SA. Securing IoT Networks in Smart Homes: Advanced Encryption Techniques and Authentication Protocols.
[17] Ugbedeojo M, Adebiyi MO, Aroba OJ, Adebiyi AA. RSA and Elliptic Curve Encryption System: A Systematic Literature Review. International Journal of Information Security and Privacy (IJISP). 2024 Jan 1;18(1):1-27.