메뉴 건너뛰기




Volumn , Issue , 2009, Pages 71-74

Secure management of personal health records by applying attribute-based encryption

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; HEALTH; WEARABLE TECHNOLOGY;

EID: 79956108309     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PHEALTH.2009.5754828     Document Type: Conference Paper
Times cited : (91)

References (5)
  • 3
    • 70350630621 scopus 로고    scopus 로고
    • Efficient and provable secure ciphertext-policy attribute-based encryption schemes
    • F. Bao, H. Li, and G.Wang, editors, Proceedings of Information Security Practice and Experience, Springer
    • L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker. Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In F. Bao, H. Li, and G.Wang, editors, Proceedings of Information Security Practice and Experience, volume 5451 of LNCS, pp. 1-12. Springer, 2009.
    • (2009) LNCS , vol.5451 , pp. 1-12
    • Ibraimi, L.1    Tang, Q.2    Hartel, P.3    Jonker, W.4
  • 4
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Elsevier
    • Jøsang, R. Ismail, and C.Boyd. A survey of trust and reputation systems for online service provision. Proceedings of Decision Support Systems, pp. 618-644. Elsevier , 2007.
    • (2007) Proceedings of Decision Support Systems , pp. 618-644
    • Jøsang1    Ismail, R.2    Boyd, C.3
  • 5
    • 85027202957 scopus 로고
    • Generalized secret sharing and monotone functions
    • S. Goldwasser, editors, Proceedings of Crypto 1988, Springer
    • J. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In S. Goldwasser, editors, Proceedings of Crypto 1988, volume 403 of LNCS, pp. 27-35. Springer, 1990.
    • (1990) LNCS , vol.403 , pp. 27-35
    • Benaloh, J.1    Leichter, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.