-
1
-
-
84905590847
-
-
Online]. Available
-
[Online]. Available: Http://www.research2guidance.com/us-1.3-b illion-The-market-for-mhealth-Applications-in-2012/
-
-
-
-
2
-
-
84905567674
-
-
Employee Benefit Research Institute. ( [Online]. Available
-
Employee Benefit Research Institute. (2008). Retirement Confidence Survey [Online]. Available: Http://www.ebri.org/surveys/hcs/
-
(2008)
Retirement Confidence Survey
-
-
-
3
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
DOI 10.1142/S0218488502001648
-
L. Sweeney, "K-Anonymity: A model for protecting privacy," Int. J. Uncertain. Fuzz., vol. 10, no. 5, pp. 557-570, 2002 (Pubitemid 35384857)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
4
-
-
84905584926
-
-
[Online]. Available
-
[Online]. Available: Http://www.healthegift.com/page/50
-
-
-
-
5
-
-
84905575527
-
-
[Online]. Available
-
[Online]. Available: Http://www.nytimes.com/2011/11/05/us/u cla-health-system-warns-About-stolen-records.html
-
-
-
-
7
-
-
84905573894
-
-
[Online]. Available
-
[Online]. Available: Http://healthcaremgt.net/blog/2011/08/areyou- educating-patients-on-ehr/
-
-
-
-
8
-
-
70349581237
-
Integrated health care economics. Part 2: Understanding the revenue drivers in fully integrated community health systems
-
D. Zismer, J. McCullough, and P. Person, "Integrated health care economics. Part 2: Understanding the revenue drivers in fully integrated community health systems," Physician Exec., vol. 35, no. 4, pp. 26-28, 2011
-
(2011)
Physician Exec
, vol.35
, Issue.4
, pp. 26-28
-
-
Zismer, D.1
McCullough, J.2
Person, P.3
-
10
-
-
84872006849
-
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
-
Singapore
-
M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings," in Proc. SECURECOMM, Singapore, 2010, pp. 89-106
-
(2010)
Proc. SECURECOMM
, pp. 89-106
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
11
-
-
74049110390
-
Patient controlled encryption: Ensuring privacy of electronic medical records
-
New York, NY, USA
-
J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, "Patient controlled encryption: Ensuring privacy of electronic medical records," in Proc. ACM Workshop CCSW, New York, NY, USA, 2009, pp. 103-114
-
(2009)
Proc. ACM Workshop CCSW
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
12
-
-
70450252045
-
Patientcentric authorization framework for sharing electronic health records
-
New York, NY, USA
-
J. Jin, G.-J. Ahn, H. Hu, M. J. Covington, and X. Zhang, "Patientcentric authorization framework for sharing electronic health records," in Proc. 14th SACMAT, New York, NY, USA, 2009, pp. 125-134
-
(2009)
Proc. 14th SACMAT
, pp. 125-134
-
-
Jin, J.1
Ahn, G.-J.2
Hu, H.3
Covington, M.J.4
Zhang, X.5
-
13
-
-
79960878565
-
FindU: Privacy-preserving personal profile matching in mobile social networks
-
Shanghai, China, Apr
-
M. Li, N. Cao, S. Yu, and W. Lou, "FindU: Privacy-preserving personal profile matching in mobile social networks," in Proc. 30th IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 2435-2443
-
(2011)
Proc. 30th IEEE INFOCOM
, pp. 2435-2443
-
-
Li, M.1
Cao, N.2
Yu, S.3
Lou, W.4
-
14
-
-
79960871684
-
Secure friend discovery in mobile social networks
-
Shanghai, China, Apr
-
W. Dong, V. Dave, L. Qiu, and Y. Zhang, "Secure friend discovery in mobile social networks," in Proc. 30th IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 1647-1655
-
(2011)
Proc. 30th IEEE INFOCOM
, pp. 1647-1655
-
-
Dong, W.1
Dave, V.2
Qiu, L.3
Zhang, Y.4
-
15
-
-
1142303699
-
Information sharing across private databases
-
NewYork, NY, USA
-
R. Agrawal, A. Evfimievski, and R. Srikant, "Information sharing across private databases," in Proc. ACM SIGMOD, NewYork, NY, USA, 2003, pp. 86-97
-
(2003)
Proc. ACM SIGMOD
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
16
-
-
0030150177
-
Comparing informationwithout leaking it
-
May
-
R. Fagin, M. Naor, and P.Winkler, "Comparing informationwithout leaking it," Commun. ACM, vol. 39, no. 5, pp. 77-85, May 1996
-
(1996)
Commun. ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
17
-
-
38049094878
-
Private and threshold set-intersection
-
Aug
-
L. Kissner and D. Song, "Private and threshold set-intersection, " in Proc. CRYPTO, Aug. 2005
-
(2005)
Proc. CRYPTO
-
-
Kissner, L.1
Song, D.2
-
18
-
-
19944388571
-
Social serendipity: Mobilizing social software
-
DOI 10.1109/MPRV.2005.37
-
N. Eagle and A. Pentland, "Social serendipity: Mobilizing social software," IEEE Pervasive Comput., vol. 4, no. 2, pp. 28-34, Apr. 2005 (Pubitemid 40750808)
-
(2005)
IEEE Pervasive Computing
, vol.4
, Issue.2
, pp. 28-34
-
-
Eagle, N.1
Pentland, A.2
-
19
-
-
0003153237
-
Non-interactive zeroknowledge and its applications
-
New York, NY, USA
-
M. Blum, P. Feldman, and S. Micali, "Non-interactive zeroknowledge and its applications," in Proc. 20th STOC, New York, NY, USA, 1988, pp. 103-112
-
(1988)
Proc. 20th STOC
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
20
-
-
44449140946
-
Efficient non-interactive proof systems for bilinear groups
-
DOI 10.1007/978-3-540-78967-3-24, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
J. Groth and A. Sahai, "Efficient non-interactive proof systems for bilinear groups," in Proc. 27th EUROCRYPT, Istanbul, Turkey, 2008, pp. 415-432 (Pubitemid 351762842)
-
(2008)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 415-432
-
-
Groth, J.1
Sahai, A.2
-
22
-
-
38149097733
-
Fully anonymous group signatures without random oracles
-
Kuching, Malaysia
-
J. Groth, "Fully anonymous group signatures without random oracles," in Proc. 13th ASIACRYPT, Kuching, Malaysia, pp. 164-180, 2007
-
(2007)
Proc. 13th ASIACRYPT
, pp. 164-180
-
-
Groth, J.1
-
23
-
-
77957925235
-
Noninteractive anonymous credentials
-
[Online]. Available
-
M. Belenkiy, M. Chase, M. Kohlweiss, and A. Lysyanskaya, "Noninteractive anonymous credentials," Cryptology ePrint Archive, Report 2007/384, 2007 [Online]. Available: Http://eprint.iacr.org/
-
(2007)
Cryptology EPrint Archive, Report 2007/ 384
-
-
Belenkiy, M.1
Chase, M.2
Kohlweiss, M.3
Lysyanskaya, A.4
-
24
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in Proc. IEEE Symp. Security Privacy, Berkeley, CA, USA, 2007, pp. 321-334 (Pubitemid 47432538)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
25
-
-
79960586120
-
Peace: An efficient and secure patient-centric access control scheme for ehealth care system
-
Shanghai, China, Apr
-
M. Barua, X. Liang, R. Lu, and X. Shen, "Peace: An efficient and secure patient-centric access control scheme for ehealth care system," in Proc. IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 970-975
-
(2011)
Proc. IEEE INFOCOM
, pp. 970-975
-
-
Barua, M.1
Liang, X.2
Lu, R.3
Shen, X.4
-
26
-
-
78650118369
-
Privacy preserving EHR system using attribute-based infrastructure
-
New York, NY, USA
-
S. Narayan, M. Gagné, and R. Safavi-Naini, "Privacy preserving EHR system using attribute-based infrastructure," in Proc. ACM CCSW, New York, NY, USA, 2010, pp. 47-52
-
(2010)
Proc. ACM CCSW
, pp. 47-52
-
-
Narayan, S.1
Gagné, M.2
Safavi-Naini, R.3
-
27
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Proc. Adv. CRYPTO, Santa Barbara, CA, USA, 2001, pp. 213-229 (Pubitemid 33317917)
-
(2001)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
29
-
-
35048887476
-
Short group signatures
-
Santa Barbara, CA, USA
-
D. Boneh, X. Boyen, and H. Shacham, "Short group signatures," in Proc. 24th CRYPTO, Santa Barbara, CA, USA, 2004, pp. 41-55
-
(2004)
Proc. 24th CRYPTO
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
30
-
-
38149009170
-
Short signatures without random oracles and the SDH assumption in bilinear groups
-
DOI 10.1007/s00145-007-9005-7
-
D. Boneh and X. Boyen, "Short signatures without random oracles and the SDH assumption in bilinear groups," J. Cryptology, vol. 21, no. 2, pp. 149-177, 2008 (Pubitemid 351653334)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
31
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Newfoundland, Canada
-
F. Hess, "Efficient identity based signature schemes based on pairings," in Proc. 9th SAC, Newfoundland, Canada, 2003, pp. 310-324
-
(2003)
Proc. 9th SAC
, pp. 310-324
-
-
Hess, F.1
-
32
-
-
30744458170
-
Alternatives to non-malleability: Definitions, constructions, and applications (extended abstract)
-
Cambridge, MA, USA
-
P. MacKenzie, M. K. Reiter, and K. Yang, "Alternatives to non-malleability: Definitions, constructions, and applications (extended abstract)," in Proc. TCC, Cambridge, MA, USA, 2004, pp. 171-190
-
(2004)
Proc. TCC
, pp. 171-190
-
-
Mackenzie, P.1
Reiter, M.K.2
Yang, K.3
-
33
-
-
84905593861
-
Electronic health records place 1st at Indy 500
-
Online]. Available
-
(2009). Electronic health records place 1st at Indy 500. NIH MedlinePlus Mag. [Online]. 4(3), pp. 16-17. Available: Http://www.nlm.nih.gov/medlineplus/ magazine/issues/pdf/ med-mag-summer2009.pdf.
-
(2009)
NIH MedlinePlus Mag
, vol.4
, Issue.3
, pp. 16-17
-
-
|