-
1
-
-
84892178040
-
Making use of cloud computing for healthcare provision: opportunities and challenges
-
N. Sultan Making use of cloud computing for healthcare provision: opportunities and challenges Int. J. Inf. Manage. 34 2014 177 184
-
(2014)
Int. J. Inf. Manage.
, vol.34
, pp. 177-184
-
-
Sultan, N.1
-
2
-
-
85018108745
-
Personal health records sharing in cloud computing environment
-
D. Jennifer, and M. Saranya Personal health records sharing in cloud computing environment Asia Pac. J. Res. I XI 2014
-
(2014)
Asia Pac. J. Res.
, vol.1
, Issue.11
-
-
Jennifer, D.1
Saranya, M.2
-
3
-
-
78650938541
-
Securing the e-health cloud
-
H. Löhr, A.-R. Sadeghi, M. Winandy, Securing the e-health cloud, in: Proceedings of the 1st ACM International Health Informatics Symposium, ACM, pp. 220-229.
-
Proceedings of the 1st ACM International Health Informatics Symposium, ACM
, pp. 220-229
-
-
Löhr, H.1
Sadeghi, A.-R.2
Winandy, M.3
-
4
-
-
80051880293
-
Authorized private keyword search over encrypted data in cloud computing
-
M. Li, S. Yu, N. Cao, W. Lou, Authorized private keyword search over encrypted data in cloud computing, in: 2011 31st International Conference on Distributed Computing Systems, ICDCS, IEEE, pp. 383-392.
-
2011 31st International Conference on Distributed Computing Systems, ICDCS, IEEE
, pp. 383-392
-
-
Li, M.1
Yu, S.2
Cao, N.3
Lou, W.4
-
5
-
-
79956108309
-
Secure management of personal health records by applying attribute-based encryption
-
L. Ibraimi, M. Asim, M. Petkovic, Secure management of personal health records by applying attribute-based encryption, in: 2009 6th International Workshop on Wearable Micro and Nano Technologies for Personalized Health, pHealth, IEEE, pp. 71-74.
-
2009 6th International Workshop on Wearable Micro and Nano Technologies for Personalized Health, pHealth, IEEE
, pp. 71-74
-
-
Ibraimi, L.1
Asim, M.2
Petkovic, M.3
-
7
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
-
Springer
-
B. Waters Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization Public Key Cryptography - PKC 2011 2011 Springer 53 70
-
(2011)
Public Key Cryptography - PKC 2011
, pp. 53-70
-
-
Waters, B.1
-
9
-
-
84884636818
-
Privacy engineering: personal health records in cloud computing environments
-
A. Kaletsch, A. Sunyaev, Privacy engineering: personal health records in cloud computing environments, in: ICIS.
-
ICIS
-
-
Kaletsch, A.1
Sunyaev, A.2
-
10
-
-
74049110390
-
Patient controlled encryption: ensuring privacy of electronic medical records
-
J. Benaloh, M. Chase, E. Horvitz, K. Lauter, Patient controlled encryption: ensuring privacy of electronic medical records, in: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, ACM, pp. 103-114.
-
Proceedings of the 2009 ACM Workshop on Cloud Computing Security, ACM
, pp. 103-114
-
-
Benaloh, J.1
Chase, M.2
Horvitz, E.3
Lauter, K.4
-
13
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption in: IEEE Symposium on Security and Privacy 2007, SP'07, IEEE, pp. 321-334.
-
IEEE Symposium on Security and Privacy 2007, SP'07, IEEE
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
14
-
-
84870885441
-
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
-
M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption IEEE Trans. Parallel Distrib. Syst. 24 2013 131 143
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
Ren, K.4
Lou, W.5
-
15
-
-
84869047881
-
Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption
-
S. Alshehri, S.P. Radziszowski, R.K. Raj, Secure access for healthcare data in the cloud using ciphertext-policy attribute-based encryption, in: 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW, IEEE, pp. 143-146.
-
2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW, IEEE
, pp. 143-146
-
-
Alshehri, S.1
Radziszowski, S.P.2
Raj, R.K.3
-
16
-
-
84870724238
-
Implementing a personal health record cloud platform using ciphertext-policy attribute-based encryption
-
C. Wang, X. Liu, W. Li, Implementing a personal health record cloud platform using ciphertext-policy attribute-based encryption, in: 2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS, IEEE, pp. 8-14.
-
2012 4th International Conference on Intelligent Networking and Collaborative Systems, INCoS, IEEE
, pp. 8-14
-
-
Wang, C.1
Liu, X.2
Li, W.3
-
18
-
-
51349090469
-
Attribute-based signature scheme
-
ISA 2008, IEEE
-
S. Guo, Y. Zeng, Attribute-based signature scheme, International Conference on Information Security and Assurance, 2008, ISA 2008, IEEE, pp. 509-511.
-
(2008)
International Conference on Information Security and Assurance
, pp. 509-511
-
-
Guo, S.1
Zeng, Y.2
-
19
-
-
70350676690
-
Threshold attribute-based signatures and their application to anonymous credential systems
-
Springer
-
S.F. Shahandashti, and R. Safavi-Naini Threshold attribute-based signatures and their application to anonymous credential systems Progress in Cryptology - AFRICACRYPT 2009 2009 Springer 198 216
-
(2009)
Progress in Cryptology - AFRICACRYPT 2009
, pp. 198-216
-
-
Shahandashti, S.F.1
Safavi-Naini, R.2
-
20
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption)? cost (signature) + cost (encryption)
-
Springer
-
Y. Zheng Digital signcryption or how to achieve cost (signature & encryption)? cost (signature) + cost (encryption) Advances in Cryptology - CRYPTO'97 1997 Springer 165 179
-
(1997)
Advances in Cryptology - CRYPTO'97
, pp. 165-179
-
-
Zheng, Y.1
-
22
-
-
84876794757
-
Attribute-based ring signcryption scheme
-
Z. Guo, M. Li, and X. Fan Attribute-based ring signcryption scheme Secur. Commun. Netw. 6 2013 790 796
-
(2013)
Secur. Commun. Netw.
, vol.6
, pp. 790-796
-
-
Guo, Z.1
Li, M.2
Fan, X.3
-
23
-
-
84891050675
-
Body area network security: a fuzzy attribute-based signcryption scheme
-
C. Hu, N. Zhang, H. Li, X. Cheng, and X. Liao Body area network security: a fuzzy attribute-based signcryption scheme IEEE J. Sel. Areas Commun. 31 2013 37 46
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, pp. 37-46
-
-
Hu, C.1
Zhang, N.2
Li, H.3
Cheng, X.4
Liao, X.5
-
25
-
-
84863069428
-
Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism
-
C. Wang, J. Huang, Attribute-based signcryption with ciphertext-policy and claim-predicate mechanism, in: 2011 Seventh International Conference on Computational Intelligence and Security, CIS, IEEE, pp. 905-909.
-
2011 Seventh International Conference on Computational Intelligence and Security, CIS, IEEE
, pp. 905-909
-
-
Wang, C.1
Huang, J.2
-
26
-
-
84857704862
-
Dynamic attribute-based signcryption without random oracles
-
K. Emura, A. Miyaji, and M.S. Rahman Dynamic attribute-based signcryption without random oracles Int. J. Appl. Cryptogr. 2 2012 199 211
-
(2012)
Int. J. Appl. Cryptogr.
, vol.2
, pp. 199-211
-
-
Emura, K.1
Miyaji, A.2
Rahman, M.S.3
-
30
-
-
0000849681
-
On the classification of ideal secret sharing schemes
-
E.F. Brickell, and D.M. Davenport On the classification of ideal secret sharing schemes J. Cryptology 4 1991 123 134
-
(1991)
J. Cryptology
, vol.4
, pp. 123-134
-
-
Brickell, E.F.1
Davenport, D.M.2
-
33
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh, and M. Franklin Identity-based encryption from the weil pairing SIAM J. Comput. 32 2003 586 615
-
(2003)
SIAM J. Comput.
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
34
-
-
58149170231
-
An efficient and provably secure id-based threshold signcryption scheme
-
F. Li, Y. Yu, An efficient and provably secure id-based threshold signcryption scheme, in: International Conference on Communications, Circuits and Systems, 2008, ICCCAS 2008, IEEE, pp. 488-492.
-
International Conference on Communications, Circuits and Systems, 2008, ICCCAS 2008, IEEE
, pp. 488-492
-
-
Li, F.1
Yu, Y.2
|