Cite this paper
Yehia, L. , Khedr, A. and Darwish, A. (2015) Hybrid Security Techniques for Internet of Things Healthcare Applications. Advances in Internet of Things
, 21-25. doi: 10.4236/ait.2015.53004
 Vermesan, O. and Friess, P. (2014) Internet of Things Applications—From Research and Innovation to Market Deployment (River Publishers Series in Communications).
 Tyagi, S., Darwish, A. and Khan, M.Y. (2014) Managing Computing Infrastructure for IoT Data. Advances in Internet of Things, 4, 29-35. http://dx.doi.org/10.4236/ait.2014.43005
 Ashton, K. (2009) That “Internet of Things” Thing. RFiD Journal, 22, 97-114.
 Darwish, A., Tyagi, S. and Agarwal, A. (2015) A New Model for IoT Based Healthcare Systems Using Cloud Computing. (Under Publication)
 Tarouco, L.M.R., Bertholdo, L.M., Granville, L.Z. and Arbiza, L.M.R. (2012) Internet of Things in Healthcare: Interoperatibility and Security Issues. 2012 IEEE International Conference on Communications (ICC), Ottawa, 10-15 June 2012, 621-6125. http://dx.doi.org/10.1109/ICC.2012.6364830
 Kayarkar, H. (2012) Classification of Various Security Techniques in Databases and Their Comparative Analysis. ACTA Technica Corviniensis, 5, 135-138.
 Yu, S. (2013) IEEE Standards Association to Exhibit at 2013, International Consumer Electronics Show and Highlight Enabling Consumer Connectivity through Consensus Building.http://standards.ieee.org/news/2013/ces2013.html#sthash.7rFlFzwB.dpuf
 Schonfeld, E. (2010) Costolo: Twitter Now Has 190 Million Users Tweeting 65 Million Times a Day.http://techcrunch.com/2010/06/08/twitter-190-million-users/
 Li, W.C., Yi, P., Wu, Y., Pan, L. and Li, J.H. (2014) A New Intrusion Detection Application Based on KNN Classification Algorithm in Wireless Sensor Network. Journal of Electrical and Computer Engineering, 2014, Article ID: 240217. http://dx.doi.org/10.1155/2014/240217
 Gupta, R.K. and Singh, P. (2013) A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network. International Journal of Emerging Technology and Advanced Engineering, 3, 2250-2459.
 Yu, L.L., Wang, Z.J. and Wang, W.F. (2012) The Application of Hybrid Encryption Algorithm in Software Security. 2012 4th International Conference on Computational Intelligence and Communication Networks (CICN), Mathura, 3-5 November 2012, 762-765. http://dx.doi.org/10.1109/cicn.2012.195
 Kessler, G.C. (2013) An Overview of Cryptography. http://www.garykessler.net/library/crypto.html
 RSA Laboratories—Chryptographic Tools. Section 2.1.5. (Unpublished) http://www.rsa.com/rsalabs/node.asp?id=2174
 Malan, D., Jones, T.F., Welsh, M. and Moulton, S. (2004) CodeBlue: An Ad-Hoc Sensor Network Infrastructure for Emergency Medical Care. Proceedings of the MobiSys 2004 Workshop on Applications of Mobile Embedded Systems, Boston, 6-9 June 2004.
 Kumar, P. and Lee, H.-J. (2012) Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey. Sensors, 12, 55-91. http://dx.doi.org/10.3390/s120100055
 Karulf, E. (2008) Body Area Networks (BAN). A Survey Paper Written under Guidance of Prof. Raj Jain. http://www.cse.wustl.edu/~jain/cse574-08/ftp/ban.pdf
 Kumar, P., Lee, S.-G. and Lee, H.-J. (2012) E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks. Sensors, 12, 1625-1647.http://dx.doi.org/10.3390/s120201625