메뉴 건너뛰기




Volumn 3677 LNCS, Issue , 2005, Pages 150-159

Privacy-preserving electronic health records

Author keywords

[No Author keywords available]

Indexed keywords

HEALTH CARE; INFORMATION SERVICES; MEDICAL COMPUTING; MULTIMEDIA SYSTEMS; ACCESS CONTROL; DATA PRIVACY; HEALTH; RECORDS MANAGEMENT;

EID: 33646153291     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11552055_15     Document Type: Conference Paper
Times cited : (19)

References (13)
  • 1
    • 84957616594 scopus 로고    scopus 로고
    • Optimistic fair exchange of digital signatures
    • N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures (extended abstract). In EUROCRYPT, pages 591-606, 1998.
    • (1998) EUROCRYPT , pp. 591-606
    • Asokan, N.1    Shoup, V.2    Waidner, M.3
  • 3
    • 84937441148 scopus 로고    scopus 로고
    • Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
    • T. Okamoto, editor, ASIACRYPT, Springer
    • J. Camenisch and I. Damgård. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In T. Okamoto, editor, ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, pages 331-345. Springer, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 331-345
    • Camenisch, J.1    Damgård, I.2
  • 4
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In EUROCRYPT, pages 93-118, 2001.
    • (2001) EUROCRYPT , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 5
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of the ACM, volume 24, pages 84-88, February 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 6
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information Systems Security, 2(1):34-64, 1999.
    • (1999) ACM Transactions on Information Systems Security , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 7
    • 84959165880 scopus 로고
    • A practical zero-knowledge protocol fitted to security microprocessor minimizing both trasmission and memory
    • L. C. Guillou and J-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both trasmission and memory. In EUROCRYPT, pages 123-128, 1988.
    • (1988) EUROCRYPT , pp. 123-128
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 8
    • 33646152637 scopus 로고    scopus 로고
    • Health card technologies, http://www.hct.com.
  • 9
    • 33646137255 scopus 로고    scopus 로고
    • Health insurance portability and accountability act. http://www.hipaa. org/.
  • 11
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 13
    • 84947917119 scopus 로고    scopus 로고
    • Publicly verifiable secret sharing
    • M. Stadler. Publicly verifiable secret sharing. In EUROCRYPT, pages 190-199, 1996.
    • (1996) EUROCRYPT , pp. 190-199
    • Stadler, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.