Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks
暂无分享,去创建一个
Yudong Zhang | Qiaoyan Wen | Yi Sun | Wenmin Li | Wenmin Li | Yi Sun | Q. Wen | Yudong Zhang
[1] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[2] Oded Goldreich. Foundations of Cryptography: Encryption Schemes , 2004 .
[3] Kannan Balasubramanian,et al. Secure Multiparty Computation , 2011, Encyclopedia of Cryptography and Security.
[4] Shucheng Yu,et al. Efficient privacy-preserving biometric identification in cloud computing , 2013, 2013 Proceedings IEEE INFOCOM.
[5] Robert Gellman,et al. Data privacy law: A study of United States data protection , 1997 .
[6] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[7] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[8] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[9] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[10] Jiafu Wan,et al. Towards Key Issues of Disaster Aid based on Wireless Body Area Networks , 2013, KSII Trans. Internet Inf. Syst..
[11] Ilias Maglogiannis,et al. Mobile healthcare information management utilizing Cloud Computing and Android OS , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.
[12] Moni Naor,et al. Oblivious Transfer with Adaptive Queries , 1999, CRYPTO.
[13] Kyung Sup Kwak,et al. Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.
[14] Keith B. Frikken. Secure multiparty computation , 2010 .
[15] Xiaofei Wang,et al. Cloud-enabled wireless body area networks for pervasive healthcare , 2013, IEEE Network.
[16] Joel R. Reidenberg,et al. Data Privacy Law: A Study of United States Data Protection , 1996 .
[17] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[18] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[19] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[20] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[21] David Chaum,et al. Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.
[22] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[23] Yehuda Lindell,et al. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, EUROCRYPT.
[24] Vinod Vaikuntanathan,et al. Efficient Fully Homomorphic Encryption from (Standard) LWE , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[25] Julien Bringer,et al. Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends , 2013, IEEE Signal Processing Magazine.