-
1
-
-
34748903407
-
Wearable and portable E-health systems
-
Sep.-Oct.
-
L. Gatzoulis and I. Iakovidis, "Wearable and portable E-health systems," IEEE Eng. Med. Biol. Mag., vol. 26, no. 5, pp. 51-56, Sep.-Oct. 2007.
-
(2007)
IEEE Eng. Med. Biol. Mag.
, vol.26
, Issue.5
, pp. 51-56
-
-
Gatzoulis, L.1
Iakovidis, I.2
-
2
-
-
0032191802
-
Towards personal health record: Current situation, obstacles and trends in implementation of electronic healthcare records in europe
-
I. Iakovidis, "Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare records in europe," Int. J. Med. Inf., vol. 52, no. 1, pp. 105-115, 1998.
-
(1998)
Int. J. Med. Inf.
, vol.52
, Issue.1
, pp. 105-115
-
-
Iakovidis, I.1
-
3
-
-
33750807884
-
A new solution for a heart failure monitoring system based on wearable and information technologies in
-
Apr.
-
E. Villalba, M. T. Arredondo, S. Guillen, and E. Hoyo-Barbolla, "A new solution for a heart failure monitoring system based on wearable and information technologies in," in Proc. Int. Workshop Wearable Implantable Body Sens. Netw., Apr. 2006, pp. 150-153.
-
(2006)
Proc. Int. Workshop Wearable Implantable Body Sens. Netw.
, pp. 150-153
-
-
Villalba, E.1
Arredondo, M.T.2
Guillen, S.3
Hoyo-Barbolla, E.4
-
4
-
-
24344478593
-
Efficient remote user authentication scheme using smart card
-
R. Lu and Z. Cao, "Efficient remote user authentication scheme using smart card," Comput. Netw., vol. 49, no. 4, pp. 535-540, 2005.
-
(2005)
Comput. Netw.
, vol.49
, Issue.4
, pp. 535-540
-
-
Lu, R.1
Cao, Z.2
-
5
-
-
68349133104
-
A privacy management architecture for patient-controlled personal health record system
-
M. D. N. Huda, N. Sonehara, and S. Yamada, "A privacy management architecture for patient-controlled personal health record system," J. Eng. Sci. Technol., vol. 4, no. 2, pp. 154-170, 2009.
-
(2009)
J. Eng. Sci. Technol.
, vol.4
, Issue.2
, pp. 154-170
-
-
Huda, M.D.N.1
Sonehara, N.2
Yamada, S.3
-
6
-
-
84956867779
-
Anonymous authentication of membership in dynamic groups in
-
S. Schechter, T. Parnell, and A. Hartemink, "Anonymous authentication of membership in dynamic groups in," in Proc. 3rd Int. Conf. Financial Cryptography, 1999, pp. 184-195.
-
(1999)
Proc. 3rd Int. Conf. Financial Cryptography
, pp. 184-195
-
-
Schechter, S.1
Parnell, T.2
Hartemink, A.3
-
7
-
-
70350662926
-
Anonymity and application privacy in context of mobile computing in eHealth
-
New York, NY, USA: Springer
-
D. Slamanig, C. Stingl, C. Menard, M. Heiligenbrunner, and J. Thierry, "Anonymity and application privacy in context of mobile computing in eHealth," in Mobile Response, New York, NY, USA: Springer, 2009 pp. 148-157.
-
(2009)
Mobile Response
, pp. 148-157
-
-
Slamanig, D.1
Stingl, C.2
Menard, C.3
Heiligenbrunner, M.4
Thierry, J.5
-
8
-
-
84877645780
-
TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular delay tolerant networks
-
J. Zhou and Z. Cao, "TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular delay tolerant networks," in Proc. IEEE Global Commun. Conf., 2012, pp. 985-990.
-
(2012)
Proc. IEEE Global Commun. Conf.
, pp. 985-990
-
-
Zhou, J.1
Cao, Z.2
-
9
-
-
70349682512
-
FDAC: Toward fine-grained distributed data access control in wireless sensor networks
-
S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks," in Proc. IEEE Conf. Comput. Commun., 2009, pp. 963-971.
-
(2009)
Proc. IEEE Conf. Comput. Commun.
, pp. 963-971
-
-
Yu, S.1
Ren, K.2
Lou, W.3
-
11
-
-
77649172678
-
Privacy and emergency response in e-healthcare leveraging wireless body sensor networks
-
Feb.
-
J. Sun, Y. Fang, and X. Zhu, "Privacy and emergency response in e-healthcare leveraging wireless body sensor networks," IEEE Wireless Commun., vol. 17, no. 1, pp. 66-73, Feb. 2010.
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.1
, pp. 66-73
-
-
Sun, J.1
Fang, Y.2
Zhu, X.3
-
12
-
-
67349253018
-
SAGE: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
-
May
-
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "SAGE: A strong privacy-preserving scheme against global eavesdropping for Ehealth systems," IEEE J. Sel. Areas Commun., vol. 27, no. 4, pp. 365-378, May 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.27
, Issue.4
, pp. 365-378
-
-
Lin, X.1
Lu, R.2
Shen, X.3
Nemoto, Y.4
Kato, N.5
-
13
-
-
80051864290
-
HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare
-
J. Sun, X. Zhu, C. Zhang, and Y. Fang, "HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare," in Proc. 31st Int. Conf. Distrib. Comput. Syst., 2011, pp. 373-382.
-
(2011)
Proc. 31st Int. Conf. Distrib. Comput. Syst.
, pp. 373-382
-
-
Sun, J.1
Zhu, X.2
Zhang, C.3
Fang, Y.4
-
14
-
-
51649110861
-
Pseudo trust: Zero-knowledge authentication in anonymous P2Ps
-
Oct.
-
L. Lu, J. Han, Y. Liu, L. Hu, J. Huai, L. M. Ni, and J. Ma, "Pseudo trust: Zero-knowledge authentication in anonymous P2Ps," IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 10, pp. 1325-1337, Oct. 2008.
-
(2008)
IEEE Trans. Parallel Distrib. Syst.
, vol.19
, Issue.10
, pp. 1325-1337
-
-
Lu, L.1
Han, J.2
Liu, Y.3
Hu, L.4
Huai, J.5
Ni, L.M.6
Ma, J.7
-
15
-
-
70350623095
-
An improved distributed key management scheme in wireless sensor networks
-
J. Zhou and M. He, "An improved distributed key management scheme in wireless sensor networks," in Proc. 9th Int. Workshop Inf. Security Appl., 2008, pp. 305-319.
-
(2008)
Proc. 9th Int. Workshop Inf. Security Appl.
, pp. 305-319
-
-
Zhou, J.1
He, M.2
-
16
-
-
84884572913
-
Securing mhealthcare social networks: Challenges, countermeasures and future directions
-
Aug.
-
J. Zhou, Z. Cao, X. Dong, X. Lin, and A. V. Vasilakos, "Securing mhealthcare social networks: challenges, countermeasures and future directions," IEEE Wireless Commun., vol. 20, no. 4, pp. 12-21, Aug. 2013.
-
(2013)
IEEE Wireless Commun.
, vol.20
, Issue.4
, pp. 12-21
-
-
Zhou, J.1
Cao, Z.2
Dong, X.3
Lin, X.4
Vasilakos, A.V.5
-
17
-
-
74049163235
-
Improving privacy and security in multi-authority attribute-based encryption
-
M. Chase and S. S. Chow, "Improving privacy and security in multi-authority attribute-based encryption," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 121-130.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 121-130
-
-
Chase, M.1
Chow, S.S.2
-
18
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in Proc. IEEE Symp. Security Privacy, 2007, pp. 321-334.
-
(2007)
Proc. IEEE Symp. Security Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
19
-
-
80051914330
-
Privacy-preserving query over encrypted graph-structured data in cloud computing
-
N. Cao, Z. Yang, C. Wang, K. Ren, and W. Lou, "Privacy-preserving query over encrypted graph-structured data in cloud computing," in Proc. 31st Int. Conf. Distrib. Comput. Syst., 2011, pp. 393-402.
-
(2011)
Proc. 31st Int. Conf. Distrib. Comput. Syst.
, pp. 393-402
-
-
Cao, N.1
Yang, Z.2
Wang, C.3
Ren, K.4
Lou, W.5
-
20
-
-
57849092101
-
A secure identity-based multi-proxy signature scheme
-
F. Cao and Z. Cao, "A secure identity-based multi-proxy signature scheme," Comput. Electr. Eng., vol. 35, pp. 86-95, 2009.
-
(2009)
Comput. Electr. Eng.
, vol.35
, pp. 86-95
-
-
Cao, F.1
Cao, Z.2
-
21
-
-
49549102632
-
Short designated verifier signature scheme and its identity-based variant
-
Jan.
-
X. Huang, W. Susilo, Y. Mu, and F. Zhang, "Short designated verifier signature scheme and its identity-based variant," Int. J. Netw. Security, vol. 6, no. 1, pp. 82-93, Jan. 2008.
-
(2008)
Int. J. Netw. Security
, vol.6
, Issue.1
, pp. 82-93
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
22
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc ACM Conf. Comput. Commun. Security, 2006, pp. 89-98.
-
(2006)
Proc ACM Conf. Comput. Commun. Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
23
-
-
77954473455
-
Attribute-based signature and its applications
-
J. Li, M. H. Au, W. Susilo, D. Xie, and K. Ren, "Attribute-based signature and its applications," in Proc. 5th ACM Symp. Inf., Comput. Commun. Security, 2010, pp. 60-69.
-
(2010)
Proc. 5th ACM Symp. Inf., Comput. Commun. Security
, pp. 60-69
-
-
Li, J.1
Au, M.H.2
Susilo, W.3
Xie, D.4
Ren, K.5
-
24
-
-
84929380626
-
-
[online]
-
PBC Library, [online] http://crypto.stanford.edu/pbc/times.html, 2006.
-
(2006)
-
-
-
25
-
-
67650522224
-
A secure e-health architecture based on the appliance of pseudonymization
-
Feb.
-
B. Riedl, V. Grascher, and T. Neubauer, "A secure e-health architecture based on the appliance of pseudonymization," J. Softw., vol. 3, no. 2, pp. 23-32, Feb. 2008.
-
(2008)
J. Softw.
, vol.3
, Issue.2
, pp. 23-32
-
-
Riedl, B.1
Grascher, V.2
Neubauer, T.3
-
27
-
-
84929380627
-
-
[online]
-
De-identified Health Inf., [online] http://aspe.hhs.gov/admnsimp/bannerps.htm, 2007.
-
(2007)
De-identified Health Inf.
-
-
-
28
-
-
84855674646
-
A secure handshake scheme with symptoms-matching for mhealthcare social network
-
Dec.
-
R. Lu, X. Lin, X. Liang, and X. Shen, "A secure handshake scheme with symptoms-matching for mhealthcare social network," J. Mobile Netw. Applications, vol. 16, no. 6, pp. 683-694, Dec. 2011.
-
(2011)
J. Mobile Netw. Applications
, vol.16
, Issue.6
, pp. 683-694
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
29
-
-
77956230334
-
Cross-domain data sharing in distributed electronic health record system
-
Jun.
-
J. Sun and Y. Fang, "Cross-domain data sharing in distributed electronic health record system," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 6, pp. 754-764, Jun. 2010.
-
(2010)
IEEE Trans. Parallel Distrib. Syst.
, vol.21
, Issue.6
, pp. 754-764
-
-
Sun, J.1
Fang, Y.2
-
30
-
-
84872006849
-
Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
-
M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings," in Proc. 6th Int. ICST Conf. Security Privacy Comm. Netw., 2010, pp. 89-106.
-
(2010)
Proc. 6th Int. ICST Conf. Security Privacy Comm. Netw.
, pp. 89-106
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
31
-
-
80055091218
-
Enforcing patient privacy in healthcare WSNs through key distribution algorithms
-
J. Misic and V. Misic, "Enforcing patient privacy in healthcare WSNs through key distribution algorithms," Security Commun. Netw. J., vol. 1, no. 5, pp. 417-429, 2008.
-
(2008)
Security Commun. Netw. J.
, vol.1
, Issue.5
, pp. 417-429
-
-
Misic, J.1
Misic, V.2
-
32
-
-
33750030809
-
Implementation of security policy for clinical information systems over wireless sensor network
-
Jan.
-
J. Misic and V. B. Misic, "Implementation of security policy for clinical information systems over wireless sensor network," Ad Hoc Netw., vol. 5, no. 1, pp. 134-144, Jan. 2007.
-
(2007)
Ad Hoc Netw.
, vol.5
, Issue.1
, pp. 134-144
-
-
Misic, J.1
Misic, V.B.2
|