-
1
-
-
84898626815
-
-
List of causes of death by rate. [Online]. Available: http://en.wikipedia. org/wiki/List-of-causes-of-death-by-rate
-
List of Causes of Death by Rate
-
-
-
2
-
-
0032216444
-
A novel emergency telemedicine system based on wireless communication technology - ambulance
-
PII S1089777198085513
-
S. Pavlopoulos, E. Kyriacou, A. Berler, S. Dembeyiotis, and D. Koutsouris, "A novel emergency telemedicine system based on wireless communication technology-ambulance," IEEE Trans. Inf. Technol. Biomed., vol. 2, no. 4, pp. 261-267, 1998. (Pubitemid 128748396)
-
(1998)
IEEE Transactions on Information Technology in Biomedicine
, vol.2
, Issue.4
, pp. 261-267
-
-
Pavlopoulos, S.1
Kyriacou, E.2
Berler, A.3
Dembeyiotis, S.4
Koutsouris, D.5
-
5
-
-
33745949749
-
-
Emergency medical services. [Online]. Available: http://en.wikipedia. org/wiki/Emergency-medical-services
-
Emergency Medical Services
-
-
-
6
-
-
84868107697
-
Secure handshake with symptomsmatching: The essential to the success of mhealthcare social network
-
R. Lu, X. Lin, X. Liang, and X. Shen, "Secure handshake with symptomsmatching: The essential to the success of mhealthcare social network," in Proc. BodyNets, 2010.
-
(2010)
Proc. BodyNets
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
7
-
-
77955579359
-
Exploring the use of social network methods in designing healthcare quality improvement teams
-
D. Meltzer, J. Chung, P. Khalili, E. Marlowa, V. Arora, G. Schumock, and R. Burt, "Exploring the use of social network methods in designing healthcare quality improvement teams," in Proc. Soc. Sci. Med., vol. 71, no. 6, 2010, pp. 1119-1130.
-
(2010)
Proc. Soc. Sci. Med.
, vol.71
, Issue.6
, pp. 1119-1130
-
-
Meltzer, D.1
Chung, J.2
Khalili, P.3
Marlowa, E.4
Arora, V.5
Schumock, G.6
Burt, R.7
-
8
-
-
77954838422
-
Managing healthcare through social networks
-
M. Domingo, "Managing healthcare through social networks," in Proc. IEEE Comput. Mag., vol. 43, no. 7, 2010, pp. 20-25.
-
(2010)
Proc. IEEE Comput. Mag.
, vol.43
, Issue.7
, pp. 20-25
-
-
Domingo, M.1
-
9
-
-
77956882701
-
Wireless sensor networks for healthcare: A survey
-
H. Alemdar and C. Ersoy, "Wireless sensor networks for healthcare: A survey," in Proc. Comput. Netw., vol. 54, no. 15,2010, pp. 2688-2710.
-
(2010)
Proc. Comput. Netw.
, vol.54
, Issue.15
, pp. 2688-2710
-
-
Alemdar, H.1
Ersoy, C.2
-
10
-
-
35549002780
-
Addressing security in medical sensor networks
-
K. Malasri and L. Wang, "Addressing security in medical sensor networks," in Proc. HealthNet, 2007, pp. 7-12.
-
(2007)
Proc. HealthNet
, pp. 7-12
-
-
Malasri, K.1
Wang, L.2
-
11
-
-
77954015919
-
A patient-centric, attributebased, source-verifiable framework for health record sharing
-
A. Mohan, D. Bauer, D. M. Blough, M. Ahamad, B. Bamba, R. Krishnan, L. Liu, D. Mashima, and B. Palanisamy, "A patient-centric, attributebased, source-verifiable framework for health record sharing," Technique Reports. [Online]. Available: http://www.cercs.gatech.edu/techreports/tr2009/git-cercs- 09-11.pdf, 2009
-
(2009)
Technique Reports
-
-
Mohan, A.1
Bauer, D.2
Blough, D.M.3
Ahamad, M.4
Bamba, B.5
Krishnan, R.6
Liu, L.7
Mashima, D.8
Palanisamy, B.9
-
12
-
-
77953976354
-
An attribute-based authorization policy framework with dynamic conflict resolution
-
A. Mohan and D. M. Blough, "An attribute-based authorization policy framework with dynamic conflict resolution," in Proc. IDtrust, 2010, pp. 37-50.
-
(2010)
Proc. IDtrust
, pp. 37-50
-
-
Mohan, A.1
Blough, D.M.2
-
13
-
-
79959305027
-
Patient self-controllable access policy on phi in ehealthcare systems
-
X. Liang, R. Lu, X. Lin, and X. Shen, "Patient self-controllable access policy on phi in ehealthcare systems," in Proc. Advances in Health Informat. Conf, 2010.
-
(2010)
Proc. Advances in Health Informat. Conf
-
-
Liang, X.1
Lu, R.2
Lin, X.3
Shen, X.4
-
14
-
-
85161646279
-
One patient, one record: Report on one-day symposium to promote patient ehealth
-
K. J. Leonard, "One patient, one record: Report on one-day symposium to promote patient ehealth," in Proc. Technique Reports. [Online]. Available:http://patientdestiny.typepad.com/OPOR%20Report%20%20Ottawa.pdf, 2010
-
(2010)
Proc. Technique Reports
-
-
Leonard, K.J.1
-
15
-
-
39049122093
-
Extracting a mobility model from real user traces
-
M. Kim, D. Kotz, and S. Kim, "Extracting a mobility model from real user traces," in Proc. IEEE INFOCOM, 2006, pp. 1-13.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-13
-
-
Kim, M.1
Kotz, D.2
Kim, S.3
-
16
-
-
69649091318
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Proc. Cryptology ePrint Archive: Report 2008/290, 2008.
-
(2008)
Proc. Cryptology EPrint Archive: Report 2008/290
-
-
Waters, B.1
-
17
-
-
38149076425
-
Short group signature without random oracles
-
X. Liang, Z. Cao, J. Shao, and H. Lin, "Short group signature without random oracles," in Proc. ICICS, 2007, pp. 69-82.
-
(2007)
Proc. ICICS
, pp. 69-82
-
-
Liang, X.1
Cao, Z.2
Shao, J.3
Lin, H.4
-
18
-
-
37149007674
-
Full-domain subgroup hiding and constant-size group signatures
-
X. Boyen and B. Waters, "Full-domain subgroup hiding and constant-size group signatures," in Proc. PKC, 2007, pp. 1-15.
-
(2007)
Proc. PKC
, pp. 1-15
-
-
Boyen, X.1
Waters, B.2
-
20
-
-
69949166012
-
Identity-based encryption with efficient revocation
-
A. Boldyreva, V. Goyal, and V. Kumar, "Identity-based encryption with efficient revocation," in Proc. ACM CCS, 2008, pp. 417-426.
-
(2008)
Proc. ACM CCS
, pp. 417-426
-
-
Boldyreva, A.1
Goyal, V.2
Kumar, V.3
-
21
-
-
35048841300
-
Efficient selective-id secure identity-based encryption without random oracles
-
D. Boneh and X. Boyen, "Efficient selective-id secure identity-based encryption without random oracles," in Proc. EUROCRYPT, 2004, pp. 223-238.
-
(2004)
Proc. EUROCRYPT
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
22
-
-
70349682512
-
Fdac: Toward fine-grained distributed data access control in wireless sensor networks
-
S. Yu, K. Ren, and W. Lou, "Fdac: Toward fine-grained distributed data access control in wireless sensor networks," in Proc. IEEE INFOCOM, 2009, pp. 963-971.
-
(2009)
Proc. IEEE INFOCOM
, pp. 963-971
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
23
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
M. Li, W. Lou, and K. Ren, "Data security and privacy in wireless body area networks," IEEE Wireless Commun., vol. 17, no. 1, pp. 51-58, 2010.
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.1
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
24
-
-
67349253018
-
Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
-
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems," IEEE J. Sel. Areas Commun., vol. 27, no. 4, pp. 365-378, 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
25
-
-
79956295485
-
Privacy policy enforcement for health information data access
-
F. Currim, E. Jung, X. Xiao, and I. Jo, "Privacy policy enforcement for health information data access," in Proc. WiMD, 2009, pp. 39-44.
-
(2009)
Proc. WiMD
, pp. 39-44
-
-
Currim, F.1
Jung, E.2
Xiao, X.3
Jo, I.4
-
26
-
-
35549010677
-
Rendezvous-based access control for medical records in the pre-hospital environment
-
F. W. Dillema and S. Lupetti, "Rendezvous-based access control for medical records in the pre-hospital environment," in Proc. HealthNet, 2007, pp. 1-6.
-
(2007)
Proc. HealthNet
, pp. 1-6
-
-
Dillema, F.W.1
Lupetti, S.2
-
27
-
-
84872124618
-
Towards a security policy for ubiquitous healthcare systems (position paper)
-
J. Kim, A. Beresford, and F. Stajano, "Towards a security policy for ubiquitous healthcare systems (position paper)," in Proc. ICUCT, 2006, pp. 263-272.
-
(2006)
Proc. ICUCT
, pp. 263-272
-
-
Kim, J.1
Beresford, A.2
Stajano, F.3
-
28
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," in Proc. IEEE Symp. Security and Privacy, 2007, pp. 321-334.
-
(2007)
Proc. IEEE Symp. Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
30
-
-
49049111604
-
Bounded ciphertext policy attribute based encryption
-
V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in Proc. ICALP (2), 2008, pp. 579-591.
-
(2008)
Proc. ICALP (2)
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
31
-
-
85084163661
-
A method for fast revocation of public key certificates and security capabilities
-
D. Boneh, X. Ding, G. Tsudik, and M. Wong, "A method for fast revocation of public key certificates and security capabilities," in Proc. USENIX Security Symp., 2001, pp. 22-22.
-
(2001)
Proc. USENIX Security Symp.
, pp. 22-22
-
-
Boneh, D.1
Ding, X.2
Tsudik, G.3
Wong, M.4
|