-
1
-
-
79959287901
-
Secure and quality of service assurance scheduling scheme for wban with application to ehealth
-
2011 IEEE, Cancun, Quintana-Roo, Mexico
-
Barua, M., Alam, M.S., Liang, X. and Shen, X. (2011) 'Secure and quality of service assurance scheduling scheme for wban with application to ehealth', Wireless Communications and Networking Conference (WCNC), 2011 IEEE, Cancun, Quintana-Roo, Mexico, pp.1-5.
-
(2011)
Wireless Communications and Networking Conference (WCNC)
, pp. 1-5
-
-
Barua, M.1
Alam, M.S.2
Liang, X.3
Shen, X.4
-
2
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
Bethencourt, J., Sahai, A. and Waters, B. (2007) 'Ciphertext-policy attribute-based encryption', Security and Privacy, 2007. SP '07. IEEE Symposium on, Washington DC, USA, pp.321-334. (Pubitemid 47432538)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
3
-
-
84922290536
-
-
Bethencourt, J., Sahai, A. and Waters, B. (2011) Advanced Crypto Software Collection, Ciphertext-Policy Attribute-Based Encryption, http://acsc.cs. utexas.edu/cpabe/
-
(2011)
Advanced Crypto Software Collection, Ciphertext-policy Attribute-based Encryption
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
Boneh, D. and Franklin, M.K. (2001) 'Identity-based encryption from the weil pairing', CRYPTO '01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag, London, UK, pp.213-229. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Goyal, V., Pandey, O., Sahai, A. and Waters, B. (2006) 'Attribute-based encryption for fine-grained access control of encrypted data', Proceedings of the 13th ACM Conference on Computer and Communications Security', CCS '06, ACM, New York, NY, USA, pp.89-98. (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
7
-
-
70350418277
-
Data hemorrhages in the health-care sector
-
Dingledine, R. and Golle, P. (Eds.) Springer, Berlin/Heidelberg
-
Johnson, M. (2009) 'Data hemorrhages in the health-care sector', in Dingledine, R. and Golle, P. (Eds.): Financial Cryptography and Data Security, Vol. 5628 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, pp.71-89.
-
(2009)
Financial Cryptography and Data Security, Vol. 5628 of Lecture Notes in Computer Science
, pp. 71-89
-
-
Johnson, M.1
-
8
-
-
77956137294
-
Cryptographic cloud storage
-
Springer-Verlag, Berlin, Heidelberg
-
Kamara, S. and Lauter, K. (2010) 'Cryptographic cloud storage', Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, FC'10, Springer-Verlag, Berlin, Heidelberg, pp.136-149.
-
(2010)
Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, FC'10
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
9
-
-
79959305027
-
Patient self-controllable access policy on phi in ehealthcare systems
-
Kitchener, Ontario, Canada
-
Liang, X., Lu, R., Lin, X. and Shen, X. (2010) 'Patient self-controllable access policy on phi in ehealthcare systems', AHIC 2010, Kitchener, Ontario, Canada, pp.1-5.
-
(2010)
AHIC 2010
, pp. 1-5
-
-
Liang, X.1
Lu, R.2
Lin, X.3
Shen, X.4
-
10
-
-
67349253018
-
Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
-
IEEE Journal on
-
Lin, X., Lu, R., Shen, X., Nemoto, Y. and Kato, N. (2009) 'Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems', Selected Areas in Communications, IEEE Journal on, Vol. 27, No. 4, pp.365-378.
-
(2009)
Selected Areas in Communications
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
11
-
-
78249245445
-
Efficient sharing of secure cloud storage services
-
2010 IEEE 10th International Conference on, Los Alamitos, CA, USA
-
Liu, Q., Wang, G. and Wu, J. (2010) 'Efficient sharing of secure cloud storage services', Computer and Information Technology (CIT), 2010 IEEE 10th International Conference on, Los Alamitos, CA, USA, pp.922-929.
-
(2010)
Computer and Information Technology (CIT)
, pp. 922-929
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
12
-
-
78249278133
-
Data-centric privacy protocol for intensive care grids
-
IEEE Transactions on
-
Luna, J., Dikaiakos, M., Marazakis, M. and Kyprianou, T. (2010) 'Data-centric privacy protocol for intensive care grids', Information Technology in Biomedicine, IEEE Transactions on, Vol. 14, No. 6, pp.1327-1337.
-
(2010)
Information Technology in Biomedicine
, vol.14
, Issue.6
, pp. 1327-1337
-
-
Luna, J.1
Dikaiakos, M.2
Marazakis, M.3
Kyprianou, T.4
-
13
-
-
84855669629
-
A secure handshake scheme with symptoms-matching for mhealthcare social network
-
Springer, Netherlands
-
Lu, R., Lin, X., Liang, X. and Shen, X. (2010) 'A secure handshake scheme with symptoms-matching for mhealthcare social network', Mobile Networks and Applications, Springer, Netherlands, pp.1-12.
-
(2010)
Mobile Networks and Applications
, pp. 1-12
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
14
-
-
84934300668
-
Computing cryptographic algorithms in portable and embedded devices
-
PORTABLE07, IEEE International Conference on, Orlando, Florida
-
Ramachandran, A., Zhou, Z. and Huang, D. (2007) 'Computing cryptographic algorithms in portable and embedded devices', Portable Information Devices, 2007. PORTABLE07, IEEE International Conference on, Orlando, Florida, pp.1-7.
-
(2007)
Portable Information Devices, 2007
, pp. 1-7
-
-
Ramachandran, A.1
Zhou, Z.2
Huang, D.3
-
15
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer, R. (Ed.) Springer, Berlin/Heidelberg
-
Sahai, A. and Waters, B. (2005) 'Fuzzy identity-based encryption', in Cramer, R. (Ed.): Advances in Cryptology - EUROCRYPT 2005, Vol. 3494 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, p.557.
-
(2005)
Advances in Cryptology - Eurocrypt 2005, Vol. 3494 of Lecture Notes in Computer Science
, pp. 557
-
-
Sahai, A.1
Waters, B.2
-
16
-
-
78649998200
-
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
-
ACM, New York, NY, USA
-
Wang, G., Liu, Q. and Wu, J. (2010) 'Hierarchical attribute-based encryption for fine-grained access control in cloud storage services', Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, ACM, New York, NY, USA, pp.735-737.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 735-737
-
-
Wang, G.1
Liu, Q.2
Wu, J.3
-
17
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
2010 Proceedings IEEE, San Diego, CA, USA
-
Yu, S., Wang, C., Ren, K. and Lou, W. (2010) 'Achieving secure, scalable, and fine-grained data access control in cloud computing', INFOCOM, 2010 Proceedings IEEE, San Diego, CA, USA, pp.1-9.
-
(2010)
INFOCOM
, pp. 1-9
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
18
-
-
77957968012
-
Security models and requirements for healthcare application clouds
-
2010 IEEE 3rd International Conference on, Miami, FL, USA
-
Zhang, R. and Liu, L. (2010) 'Security models and requirements for healthcare application clouds', Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on, Miami, FL, USA, pp.268-275.
-
(2010)
Cloud Computing (CLOUD)
, pp. 268-275
-
-
Zhang, R.1
Liu, L.2
-
19
-
-
33744913525
-
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices
-
Internet and Network Economics - First International Workshop, WINE 2005, Proceedings
-
Zhu, R., Yang, G. and Wong, D. (2005) 'An efficient identity-based key exchange protocol with kgs forward secrecy for low-power devices', Internet and Network Economics, Vol. 3828, pp.500-509. (Pubitemid 43849288)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3828
, pp. 500-509
-
-
Zhu, R.W.1
Yang, G.2
Wong, D.S.3
|