메뉴 건너뛰기




Volumn 37, Issue 5, 2013, Pages

An enhanced mobile-healthcare emergency system based on extended chaotic maps

Author keywords

Anonymity; Chaoticmaps; Mobile Healthcare emergency; Mutual authentication; Opportunistic computing

Indexed keywords

ARTICLE; CLINICAL PROTOCOL; EMERGENCY CARE; HEALTH CARE ACCESS; HEALTH CARE SYSTEM; HUMAN; MOBILE HEALTHCARE EMERGENCY SYSTEM; MOBILE PHONE; PRIVACY; COMPUTER NETWORK; COMPUTER SECURITY; CONFIDENTIALITY; TELEMEDICINE;

EID: 84883484959     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-013-9973-0     Document Type: Article
Times cited : (50)

References (36)
  • 1
    • 84870504149 scopus 로고    scopus 로고
    • A new efficient privacypreserving scalar product protocol
    • Amirbekyan, A., and Estivill-Castro, V., A new efficient privacypreserving scalar product protocol. In Proc. of AusDM'07. pp. 209-214, 2007.
    • (2007) Proc. of AusDM'07 , pp. 209-214
    • Amirbekyan, A.1    Estivill-Castro, V.2
  • 3
    • 23144460039 scopus 로고    scopus 로고
    • Security of public-key cryptosystems based on chebyshev polynomials
    • Bergamo, P., D'Arco, P., De Santis, A., and Kocarev, L., Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circ. Syst-I 52(7):1382-1393, 2005.
    • (2005) IEEE Trans. Circ. Syst-I , vol.52 , Issue.7 , pp. 1382-1393
    • Bergamo, P.1    D'Arco, P.2    De Santis, A.3    Kocarev, L.4
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. K. Franklin, Identity-based encryption from the weil pairing, in Proc. of CRYPTO'01, pp. 213-229, 2001.
    • (2001) Proc. of CRYPTO'01 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 6
    • 84857051686 scopus 로고    scopus 로고
    • Improving the efficiency of anonymous routing for manets
    • Chen, J. T., Boreli, R., and Sivaraman,V., Improving the efficiency of anonymous routing for MANETs. Comput. Commun. 35(5):619-627, 2012.
    • (2012) Comput. Commun , vol.35 , Issue.5 , pp. 619-627
    • Chen, J.T.1    Boreli, R.2    Sivaraman, V.3
  • 7
    • 77956388759 scopus 로고    scopus 로고
    • From opportunistic networks to opportunistic computing
    • Conti, M., Giordano, S., May, M., and Passarella, A., From opportunistic networks to opportunistic computing. IEEE Commun. Mag. 48(9):126-139, 2010.
    • (2010) IEEE Commun. Mag. , vol.48 , Issue.9 , pp. 126-139
    • Conti, M.1    Giordano, S.2    May, M.3    Passarella, A.4
  • 8
    • 76649094265 scopus 로고    scopus 로고
    • Opportunities in opportunistic computing
    • Conti, M., andKumar, M., Opportunities in opportunistic computing. IEEE Comput. 43(1):42-50, 2010.
    • (2010) IEEE Comput , vol.43 , Issue.1 , pp. 42-50
    • Conti, M.1    Kumar, M.2
  • 9
    • 84927517111 scopus 로고    scopus 로고
    • Privacy-preserving cooperative statistical analysis
    • W. Du and M. Atallah, Privacy-preserving cooperative statistical analysis, in Proc. of ACSAC'01, pp. 102-111, 2001.
    • (2001) Proc. Of ACSAC'01 , pp. 102-111
    • Du, W.1    Atallah, M.2
  • 10
    • 62949175202 scopus 로고    scopus 로고
    • Chaotic map based key agreement with/out clock synchronization
    • Han, S., and Chang, E., Chaotic map based key agreement with/out clock synchronization. Chaos, Solitons Fractals 39(3):1283-1289, 2009.
    • (2009) Chaos Solitons Fractals , vol.39 , Issue.3 , pp. 1283-1289
    • Han, S.1    Chang, E.2
  • 11
    • 84863989374 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
    • He, D., Chen, Y., and Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn 69(3):1149-1157, 2012.
    • (2012) Nonlinear Dyn , vol.69 , Issue.3 , pp. 1149-1157
    • He, D.1    Chen, Y.2    Chen, J.3
  • 12
    • 78751657441 scopus 로고    scopus 로고
    • Abaka: An anonymous batch authenticated and key agreement scheme for value-Added services in vehicular ad hoc networks
    • Huang, J. L., Yeh, L. Y., and Chien, H. Y., ABAKA: An anonymous batch authenticated and key agreement scheme for value-Added services in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 60(1): 248-262, 2011.
    • (2011) IEEE Trans. Veh. Technol. , vol.60 , Issue.1 , pp. 248-262
    • Huang, J.L.1    Yeh, L.Y.2    Chien, H.Y.3
  • 13
    • 84861748201 scopus 로고    scopus 로고
    • An extended chaotic maps-based key agreement protocol with user anonymity
    • Lee, C. C., Chen, C. L., Wu, C. Y., and Huang, S. Y., An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1-2):79-87, 2012.
    • (2012) Nonlinear Dyn. , vol.69 , Issue.1-2 , pp. 79-87
    • Lee, C.C.1    Chen, C.L.2    Wu, C.Y.3    Huang, S.Y.4
  • 14
    • 84871955339 scopus 로고    scopus 로고
    • A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
    • Lee, C. C., and Hsu, C. W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1-2):201-211, 2013.
    • (2013) Nonlinear Dyn. , vol.71 , Issue.1-2 , pp. 201-211
    • Lee, C.C.1    Hsu, C.W.2
  • 15
    • 84880254414 scopus 로고    scopus 로고
    • Toward a secure batch verification with group testing for vanet
    • doi:10.1007/s11276-013-0543-7
    • Lee, C. C., and Lai, Y. M., Toward a secure batch verification with group testing for VANET. Wirel. Netw, 2013. doi:10.1007/s11276-013-0543-7.
    • (2013) Wirel. Netw
    • Lee, C.C.1    Lai, Y.M.2
  • 16
    • 77649094379 scopus 로고    scopus 로고
    • Data security and privacy in wireless body area networks
    • Li, M., Lou, W., and Ren, K., Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1):51-58, 2010.
    • (2010) IEEE Wirel. Commun. , vol.17 , Issue.1 , pp. 51-58
    • Li, M.1    Lou, W.2    Ren, K.3
  • 17
    • 67349253018 scopus 로고    scopus 로고
    • Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
    • Lin, X., Lu, R., Shen, X., Nemoto, Y., and Kato, N., Sage: A strong privacy-preserving scheme against global eavesdropping for Ehealth systems. IEEE J. Select. Areas Commun. 27(4):365-378, 2009.
    • (2009) IEEE J. Select. Areas Commun. , vol.27 , Issue.4 , pp. 365-378
    • Lin, X.1    Lu, R.2    Shen, X.3    Nemoto, Y.4    Kato, N.5
  • 18
    • 36749076982 scopus 로고    scopus 로고
    • Gsis: A secure and privacy preserving protocol for vehicular communications
    • Lin, X., Sun, X., Ho, P., and Shen, X., Gsis: A secure and privacy preserving protocol for vehicular communications. IEEE Trans. Veh. Technol. 56(6):3442-3456, 2007.
    • (2007) IEEE Trans. Veh. Technol. , vol.56 , Issue.6 , pp. 3442-3456
    • Lin, X.1    Sun, X.2    Ho, P.3    Shen, X.4
  • 19
    • 84870885441 scopus 로고    scopus 로고
    • Scalable and secure sharing of personal health records in cloud computing using attributebased encryption
    • Li, M., Yu, S., Zheng, Y., Ren, K., and Lou,W., Scalable and secure sharing of personal health records in cloud computing using attributebased encryption. IEEE Trans. Parallel Distrib. Syst. 24(1):131-143, 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.1 , pp. 131-143
    • Li, M.1    Yu, S.2    Zheng, Y.3    Ren, K.4    Lou, W.5
  • 20
    • 74849102302 scopus 로고    scopus 로고
    • Bubblesensing: Binding sensing tasks to the physical world
    • Lu, H., Lane, N. D., Eisenman, S. B., and Campbell, A. T., Bubblesensing: Binding sensing tasks to the physical world. Pervasive Mob. Comput. 6(1):58-71, 2010.
    • (2010) Pervasive Mob. Comput , vol.6 , Issue.1 , pp. 58-71
    • Lu, H.1    Lane, N.D.2    Eisenman, S.B.3    Campbell, A.T.4
  • 21
    • 84855674646 scopus 로고    scopus 로고
    • A secure handshake scheme with symptoms-matching for mhealthcare social network
    • Lu, R., Lin, X., Liang, X., and Shen, X., A secure handshake scheme with symptoms-matching for Mhealthcare social network. Mob. Netw. Appl. 16(6):683-694, 2011.
    • (2011) Mob. Netw. Appl. , vol.16 , Issue.6 , pp. 683-694
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 22
    • 84862685743 scopus 로고    scopus 로고
    • Secure handshake with symptoms-matching: The essential to the success of mhealthcare social network
    • R. Lu, X. Lin, X. Liang, and X. Shen, Secure handshake with symptoms-matching: the essential to the success of Mhealthcare social network, in Proc. BodyNets'10, pp. 8-15, 2010.
    • Proc.BodyNets'10 , vol.2010 , pp. 8-15
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 23
    • 84856182115 scopus 로고    scopus 로고
    • Pseudonym changing at social spots: An effective strategy for location privacy in vanets
    • Lu, R., Lin, X., Luan, H., Liang, X., and Shen, X., Pseudonym changing at social spots: An effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1):86-96, 2012.
    • (2012) IEEE Trans. Veh. Technol. , vol.61 , Issue.1 , pp. 86-96
    • Lu, R.1    Lin, X.2    Luan, H.3    Liang, X.4    Shen, X.5
  • 24
    • 84873848479 scopus 로고    scopus 로고
    • Spoc: A secure and privacypreserving opportunistic computing framework for mobilehealthcare emergency
    • Lu, R., Lin, X., and Shen, X., SPOC: A secure and privacypreserving opportunistic computing framework for mobilehealthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3): 614-624, 2012.
    • (2012) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.3 , pp. 614-624
    • Lu, R.1    Lin, X.2    Shen, X.3
  • 25
    • 77954592983 scopus 로고    scopus 로고
    • An intelligent secure and privacy-preserving parking scheme through vehicular communications
    • Lu, R., Lin, X., Zhu, H., and Shen, X., An intelligent secure and privacy-preserving parking scheme through vehicular communications. IEEE Trans. Veh. Technol. 59(6):2772-2785, 2010.
    • (2010) IEEE Trans. Veh. Technol. , vol.59 , Issue.6 , pp. 2772-2785
    • Lu, R.1    Lin, X.2    Zhu, H.3    Shen, X.4
  • 28
    • 78650189746 scopus 로고    scopus 로고
    • Performance evaluation of service execution in opportunistic computing
    • A. Passarella, M. Conti, E. Borgia, and M. Kumar, Performance evaluation of service execution in opportunistic computing, in Proc. of ACM MSWIM'10, pp. 291-298, 2010.
    • (2010) Proc.of ACM MSWIM'10 , pp. 291-298
    • Passarella, A.1    Conti, M.2    Borgia, E.3    Kumar, M.4
  • 29
    • 77649151691 scopus 로고    scopus 로고
    • Monitoring patients via a secure and mobile healthcare system
    • Ren, Y., Pazzi, R.W. N., and Boukerche, A., Monitoring patients via a secure and mobile healthcare system. IEEE Wirel. Commun. 17(1): 59-65, 2010.
    • (2010) IEEE Wirel.Commun , vol.17 , Issue.1 , pp. 59-65
    • Ren, Y.1    Pazzi, R.W.N.2    Boukerche, A.3
  • 30
    • 77956230334 scopus 로고    scopus 로고
    • Cross-domain data sharing in distributed electronic health record systems
    • Sun, J., and Fang, Y., Cross-domain data sharing in distributed electronic health record systems. IEEE Trans. Parallel Distrib. Syst. 21(6):754-764, 2010.
    • (2010) IEEE Trans. Parallel Distrib. Syst. , vol.21 , Issue.6 , pp. 754-764
    • Sun, J.1    Fang, Y.2
  • 31
    • 67651165303 scopus 로고    scopus 로고
    • Enabling secure service discovery in mobile healthcare enterprise networks
    • Toninelli, A., Montanari, R., and Corradi, A., Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wirel. Commun. 16(3):24-32, 2009.
    • (2009) IEEE Wirel. Commun. , vol.16 , Issue.3 , pp. 24-32
    • Toninelli, A.1    Montanari, R.2    Corradi, A.3
  • 32
    • 0242709355 scopus 로고    scopus 로고
    • Privacy preserving association rule mining in vertically partitioned data
    • J. Vaidya and C. Clifton, Privacy preserving association rule mining in vertically partitioned data, in Proc. of ACMKDD'02, pp.639-644, 2002.
    • (2002) Proc. of ACMKDD'02 , pp. 639-644
    • Vaidya, J.1    Clifton, C.2
  • 34
    • 84856471309 scopus 로고    scopus 로고
    • Efficiency and security problems of anonymous key agreement protocol based on chaotic maps
    • Yoon, E. J., Efficiency and security problems of anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17(7):2735-2740, 2012.
    • (2012) Commun. Nonlinear Sci. Numer. Simul. , vol.17 , Issue.7 , pp. 2735-2740
    • Yoon, E.J.1
  • 35
    • 35348829192 scopus 로고    scopus 로고
    • Wireless body sensor network using medical implant band
    • Yuce, M. R., Ng, S. W. P., Myo, N. L., Khan, J. Y., and Liu, W., Wireless body sensor network using medical implant band. J. Med. Syst. 31(6):467-474, 2007.
    • (2007) J. Med. Syst. , vol.31 , Issue.6 , pp. 467-474
    • Yuce, M.R.1    Ng, S.W.P.2    Myo, N.L.3    Khan, J.Y.4    Liu, W.5
  • 36
    • 40249103088 scopus 로고    scopus 로고
    • Cryptanalysis of the public key encryption based on multiple chaotic systems
    • Zhang, L., Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3):669-674, 2008.
    • (2008) Chaos, Solitons Fractals , vol.37 , Issue.3 , pp. 669-674
    • Zhang, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.