-
1
-
-
77649107719
-
Applications, challenges and prospective In emerging body area networking technologies
-
Maulin Patel and Jian Feng Wang.2010.Applications, Challenges and Prospective In Emerging Body Area Networking Technologies, IEEE Wireless Communications, 1536-1284.
-
(2010)
IEEE Wireless Communications
, pp. 1284-1536
-
-
Patel, M.1
Wang, J.F.2
-
2
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
February 2010
-
Ming Li and Wenjing Lou.2010.Data security and Privacy in wireless body area networks. IEEE Wireless Communications, 1536-1284 • February 2010.
-
(2010)
IEEE Wireless Communications
, vol.1536-1284
-
-
Li, M.1
Lou, W.2
-
3
-
-
18244373181
-
A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation
-
Mar. 2005
-
E. Jovanov et al.2005. A Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation. J. NeuroEng. Rehab. vol. 2, no. 6, Mar. 2005.
-
(2005)
J. NeuroEng. Rehab
, vol.2
, Issue.6
-
-
Jovanov, E.1
-
4
-
-
84859078042
-
A survey on futuristic health care system: WBANs
-
Elsevier Ltd., 2011, (2012) 889 - 896
-
Ragesh.G.K and Dr.K.Baskaran.2012.A Survey on Futuristic Health Care System: WBANs. Elsevier Ltd. 1877-7058, 2011, www.sciencedirect.com -Procedia Engineering 30 (2012) 889 - 896.
-
(2012)
Procedia Engineering
, vol.30
, pp. 1877-7058
-
-
Ragesh, G.K.1
Baskaran, Dr.K.2
-
8
-
-
0012970453
-
Identity-Based encryption from the weil pairing
-
Santa Barbara, California, USA, August 19-23, 2001, Proceedings, 2001
-
D. Boneh and M. Franklin.2001. Identity-Based Encryption from the Weil Pairing. Advances in Cryptology-Crypto2001: 21st Annual International Cryptology conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, 2001.
-
(2001)
Advances in Cryptology-Crypto2001: 21st Annual International Cryptology Conference
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
38049078557
-
Multi-Authority attribute based encryption
-
S. P. Vadhan, editor, TCC, of, Springer, 2007
-
M. Chase.2007. Multi-authority Attribute Based Encryption In S. P. Vadhan, editor, TCC, volume 4392 of Lecture Notes in Computer Science, pages 515-534. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4392
, pp. 515-534
-
-
Chase, M.1
-
10
-
-
49049111604
-
-
ICALP (2), of, Springer, 2008
-
V. Goyal, A. Jain, O. Pandey, and A. Sahai.2008. ICALP (2), volume 5126 of Lecture Notes in Computer Science, pages 579-591. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5126
, pp. 579-591
-
-
Goyal, V.1
Jain, A.2
Pandey, O.3
Sahai, A.4
-
11
-
-
79959287901
-
Secure and quality of service assurance scheduling scheme for wban with application to eHealth
-
2011 IEEE, Cancun, Quintana-Roo, Mexico
-
Barua, M., Alam, M.S., Liang, X. and Shen, X. 2011. 'Secure and quality of service assurance scheduling scheme for wban with application to eHealth', Wireless Communications and Networking Conference (WCNC), 2011 IEEE, Cancun, Quintana-Roo, Mexico, pp.1-5.
-
(2011)
Wireless Communications and Networking Conference (WCNC)
, pp. 1-5
-
-
Barua, M.1
Alam, S.M.2
Liang, X.3
Shen, X.4
-
12
-
-
34547273527
-
Based encryption for fine-grained access control of encrypted data
-
Attribute, 2006
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters.2006. Attribute-based encryption for fine-grained access control of encrypted data. In ACM Conference on Computer and Communications Security, pages 89-98, 2006.
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
14
-
-
70350418277
-
Data hemorrhages in the health-Care sector financial cryptography and data security
-
Springer, Berlin/Heidelberg
-
Johnson, M. 2009.Data hemorrhages in the health-care sector Financial Cryptography and Data Security, Vol. 5628 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, pp.71-89.
-
(2009)
Lecture Notes in Computer Science
, vol.5628
, pp. 71-89
-
-
Johnson, M.1
-
15
-
-
77956137294
-
Cryptographic cloud storage
-
FC'10, Springer-Verlag, Berlin, Heidelberg
-
Kamara, S. and Lauter, K. 2010. Cryptographic cloud Storage. Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, FC'10, Springer-Verlag, Berlin, Heidelberg, pp.136-149.
-
(2010)
Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
16
-
-
79959305027
-
Patient self-controllable access policy on phi in e-healthcare systems
-
Ontario, Canada
-
Liang, X., Lu, R., Lin, X. and Shen, X. 2010. Patient self-controllable access policy on phi in e-healthcare systems. AHIC 2010, Kitchener, Ontario, Canada, pp.1-5.
-
(2010)
AHIC 2010, Kitchener
, pp. 1-5
-
-
Liang, X.1
Lu, R.2
Lin, X.3
Shen, X.4
-
17
-
-
67349253018
-
Sage: A strong privacy-preserving scheme against global eavesdropping for e-health systems
-
Lin, X., Lu, R., Shen, X., Nemoto, Y. and Kato, N. 2009.Sage: a strong privacy-preserving scheme against global eavesdropping for e-health systems. Selected Areas in Communications, IEEE Journal on, Vol. 27, No. 4, pp.365-378.
-
(2009)
Selected Areas in Communications, IEEE Journal on
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
19
-
-
78249278133
-
Data-centric privacy protocol for intensive care grids
-
Luna, J., Dikaiakos, M., Marazakis, M. and Kyprianou, T.2010. Data-centric privacy protocol for intensive care grids. Information Technology in Biomedicine, IEEE Transactions on, Vol. 14, No. 6, pp.1327-1337.
-
(2010)
Information Technology in Biomedicine, IEEE Transactions on
, vol.14
, Issue.6
, pp. 1327-1337
-
-
Luna, J.1
Dikaiakos, M.2
Marazakis, M.3
Kyprianou, T.4
-
20
-
-
84855669629
-
A secure handshake scheme with symptoms-matching for mhealthcare social network
-
Springer, Netherlands
-
Lu, R., Lin, X., Liang, X. and Shen, X. 2010.A Secure handshake scheme with symptoms-matching For mhealthcare social network. Mobile Networks and Applications, Springer, Netherlands, pp.1-12.
-
(2010)
Mobile Networks and Applications
, pp. 1-12
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
21
-
-
84934300668
-
Computing cryptographic algorithms in portable and embedded devices, Portable Information Devices, 2007
-
Orlando, Florida
-
Ramachandran, A., Zhou, Z. and Huang, D. 2007. Computing cryptographic algorithms in portable and embedded devices, Portable Information Devices, 2007.PORTABLE07, IEEE International Conference on, Orlando, Florida, pp.1-7.
-
(2007)
PORTABLE07, IEEE International Conference on
, pp. 1-7
-
-
Ramachandran, A.1
Zhou, Z.2
Huang, D.3
-
22
-
-
24944554962
-
Fuzzy identity-based encryption
-
Cramer, R. (Ed.):, Vol. 3494 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg
-
Sahai, A. and Waters, B. 2005.Fuzzy identity-based encryption in Cramer, R. (Ed.): Advances in Cryptology - EUROCRYPT 2005, Vol. 3494 of Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, p.557.
-
(2005)
Advances in Cryptology - EUROCRYPT 2005
, pp. 557
-
-
Sahai, A.1
Waters, B.2
-
24
-
-
84879830762
-
-
http://acsc.csl.sri.com/cpabe/.
-
-
-
-
25
-
-
84879808439
-
-
http://crypto.stanford.edu/pbc/.
-
-
-
|