-
1
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)
-
(2006)
ACM Trans. Inf. Syst. Secur
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
83055187003
-
Cloning for privacy protection in multiple independent data publications
-
Baig, M.M., Li, J., Liu, J., Wang, H.: Cloning for privacy protection in multiple independent data publications. In: Proceedings of the 20th ACM International Conference on Information and knowledge Management, CIKM 2011, p. 885 (2011)
-
(2011)
Proceedings of the 20Th ACM International Conference on Information and Knowledge Management, CIKM 2011
-
-
Baig, M.M.1
Li, J.2
Liu, J.3
Wang, H.4
-
3
-
-
84902336183
-
How to Collect Consent for an Anonymous Medical Database
-
Benoist, E., Sliwa, J.: How to Collect Consent for an Anonymous Medical Database. HEALTHINF (2014)
-
(2014)
HEALTHINF
-
-
Benoist, E.1
Sliwa, J.2
-
4
-
-
23044483770
-
-
Cambridge University Press, New York
-
Blake, I., Seroussi, G., Smart, N., Cassels, J.W.S.: Advances in Elliptic Curve Cryptography. Cambridge University Press, New York (2005)
-
(2005)
Advances in Elliptic Curve Cryptography
-
-
Blake, I.1
Seroussi, G.2
Smart, N.3
Cassels, J.4
-
5
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
In: Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public Key Encryption with Keyword Search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
8
-
-
84942625751
-
Privacy preserving interoperability for personalized medicine
-
September
-
Dubovitskaya, A., Urovi, V., Vasirani, M., Aberer, K., Fuchs, A., Buclin, T., Thoma, Y., Schumacher, M.: Privacy preserving interoperability for personalized medicine. Swiss Medical Informatics (September 2014)
-
(2014)
Swiss Medical Informatics
-
-
Dubovitskaya, A.1
Urovi, V.2
Vasirani, M.3
Aberer, K.4
Fuchs, A.5
Buclin, T.6
Thoma, Y.7
Schumacher, M.8
-
9
-
-
77955514675
-
-
Elger, B.S., Iavindrasana, J., Lo Lacono, L., Müller, H., Roduit, N., Summers, P., Wright, J.: Strategies for health data exchange for secondary, cross-institutional clinical research. Computer Methods and Programs in Biomedicine 99, 230–251 (2010)
-
(2010)
Strategies for Health Data Exchange for Secondary, Cross-Institutional Clinical Research. Computer Methods and Programs in Biomedicine
, vol.99
, pp. 230-251
-
-
Elger, B.S.1
Iavindrasana, J.2
Lo Lacono, L.3
Müller, H.4
Roduit, N.5
Summers, P.6
Wright, J.7
-
11
-
-
84905223399
-
Publishing data from electronic health records while preserving privacy: A survey of algorithms
-
Gkoulalas-Divanis, A., Loukides, G., Sun, J.: Publishing data from electronic health records while preserving privacy: A survey of algorithms. Journal of Biomedical Informatics 50, 4–19 (2014)
-
(2014)
Journal of Biomedical Informatics
, vol.50
, pp. 4-19
-
-
Gkoulalas-Divanis, A.1
Loukides, G.2
Sun, J.3
-
12
-
-
84857073563
-
Therapeutic drug monitoring of imatinib
-
Gotta, V., Widmer, N., Montemurro, M., Leyvraz, S., Haouala, A., Decosterd, L.A., Csajka, C., Buclin, T.: Therapeutic drug monitoring of imatinib. Clinical Pharmacokinetics 51(3), 187–201 (2012)
-
(2012)
Clinical Pharmacokinetics
, vol.51
, Issue.3
, pp. 187-201
-
-
Gotta, V.1
Widmer, N.2
Montemurro, M.3
Leyvraz, S.4
Haouala, A.5
Decosterd, L.A.6
Csajka, C.7
Buclin, T.8
-
13
-
-
85076880634
-
Building web applications on top of encrypted data using Mylar
-
Helfer, J., Valdez, S., Popa, R.A., Stark, E., Zeldovich, N., Frans Kaashoek, M., Balakrishnan, H.: Building web applications on top of encrypted data using Mylar. In: Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, pp. 157–172 (2014)
-
(2014)
Proceedings of the 11Th USENIX Conference on Networked Systems Design and Implementation
, pp. 157-172
-
-
Helfer, J.1
Valdez, S.2
Popa, R.A.3
Stark, E.4
Zeldovich, N.5
Frans Kaashoek, M.6
Balakrishnan, H.7
-
15
-
-
84872006849
-
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings
-
In: Jajodia, S., Zhou, J. (eds.), Springer, Heidelberg
-
Li, M., Yu, S., Ren, K., Lou, W.: Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 89–106. Springer, Heidelberg (2010)
-
(2010)
Securecomm 2010. LNICST, Vol. 50
, pp. 89-106
-
-
Li, M.1
Yu, S.2
Ren, K.3
Lou, W.4
-
16
-
-
84870885441
-
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
-
Li, M., Yu, S., Zheng, Y.: Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. IEEE Tranyactions on Parallel and Distributed Systems 24(1), 131–143 (2013)
-
(2013)
IEEE Tranyactions on Parallel and Distributed Systems
, vol.24
, Issue.1
, pp. 131-143
-
-
Li, M.1
Yu, S.2
Zheng, Y.3
-
17
-
-
80052399505
-
A secure electronic medical record sharing mechanism in the cloud computing platform
-
June
-
Li, Z.-R., Chang, E.-C., Huang, K.-H., Lai, F.: A secure electronic medical record sharing mechanism in the cloud computing platform. In: 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE), pp. 98–103, June 2011
-
(2011)
2011 IEEE 15Th International Symposium on Consumer Electronics (ISCE)
, pp. 98-103
-
-
Li, Z.-R.1
Chang, E.-C.2
Huang, K.-H.3
Lai, F.4
-
18
-
-
34548557737
-
Multi-centric universal pseudonymisation for secondary use of the EHR
-
Lo Iacono, L.: Multi-centric universal pseudonymisation for secondary use of the EHR. Studies in Health Technology and Informatics 126, 239–247 (2007)
-
(2007)
Studies in Health Technology and Informatics
, vol.126
, pp. 239-247
-
-
Lo Iacono, L.1
-
19
-
-
84893305993
-
Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management
-
Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y.: Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management. In: Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, pp. 248–252 (2013)
-
(2013)
Eighth International Conference on Broadband and Wireless Computing, Communication and Applications
, pp. 248-252
-
-
Lounis, A.1
Hadjidj, A.2
Bouabdallah, A.3
Challal, Y.4
-
20
-
-
84908042100
-
Multi-key searchable encryption
-
ePrint Archive, Report 2013/508
-
Popa, R.A., Zeldovich, N.: Multi-key searchable encryption. Cryptology ePrint Archive, Report 2013/508 (2013)
-
(2013)
Cryptology
-
-
Popa, R.A.1
Zeldovich, N.2
-
21
-
-
84886568546
-
Anonymizing Data with Relational and Transaction Attributes
-
Blockeel, H., Kersting, K., Nijssen, S., Železný, F. (eds.) , Springer, Heidelberg
-
Poulis, G., Loukides, G., Gkoulalas-Divanis, A., Skiadopoulos, S.: Anonymizing Data with Relational and Transaction Attributes. In: Blockeel, H., Kersting, K., Nijssen, S., Železný, F. (eds.) ECML PKDD 2013, Part III. LNCS, vol. 8190, pp. 353–369. Springer, Heidelberg (2013)
-
(2013)
ECML PKDD 2013, Part III. LNCS
, vol.8190
, pp. 353-369
-
-
Poulis, G.1
Loukides, G.2
Gkoulalas-Divanis, A.3
Skiadopoulos, S.4
-
25
-
-
84894706408
-
Secure P2P cross-community health record exchange in IHE compatible systems
-
Urovi, V., Olivieri, A.C., Brugués de la Torre, A., Bromuri, S., Fornara, N., Schumacher, M.: Secure P2P cross-community health record exchange in IHE compatible systems. International Journal on Artificial Intelligence Tools 23(1) (2014)
-
(2014)
International Journal on Artificial Intelligence Tools
, vol.23
, Issue.1
-
-
Urovi, V.1
Olivieri, A.C.2
Brugués De La Torre, A.3
Bromuri, S.4
Fornara, N.5
Schumacher, M.6
-
26
-
-
84902319993
-
A Decentralized Pseudonym Scheme for Cloud-based eHealth Systems
-
Xu, L., Cremers, A.B.: A Decentralized Pseudonym Scheme for Cloud-based eHealth Systems. HEALTHINF (2014)
-
(2014)
HEALTHINF
-
-
Xu, L.1
Cremers, A.B.2
-
27
-
-
77953310709
-
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
-
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing. In: INFOCOM. IEEE (2010)
-
(2010)
INFOCOM. IEEE
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|