1. Jiang, Q., Ma, J., Yang, C., Ma, X., Shen, J., Chaudhr, S .A.: Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput. Electr. Eng. 63(C), 182–195 (2017).
https://doi.org/10.1016/j.compeleceng.2017.03.016
2. Alder, S., Kelleher, A., Greene, S.: HIPAA compliance guide. HIPAA J 1–65 (2015)
3. Hipaa basics for providers: privacy, security, and breach notification rules. Centers for Medicare and Medicaid Services, pp 1–7 (2016).
https://www.cms.gov/Outreach-and-Education/Medicare-Learning-Network-MLN/MLNProducts/MLN-Publications-Items/ICN909001.html
4. Ray, S., Biswas, G.P.: A certificate authority (CA)-based cryptographic solution for hipaa privacy/security regulations. J. King Saud Univ. Comput. Inf. Sci. 26(2), 170–180 (2014)
5. Li, X., Peng, J., Kumari, S., Wu, F., Karuppiah, M., Choo, K .K.R.: An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng. 61(C), 238–249 (2017).
https://doi.org/10.1016/j.compeleceng.2017.02.011