Secure e-Health System for the Integrated Management of Personal Health Data Collected by IoT Devices
暂无分享,去创建一个
Sergiy Gnatyuk | Maksim Iavich | Razvan Bocu | Yuliia Sotnichenko | Dinara Ospanova | S. Gnatyuk | M. Iavich | R. Bocu | Yuliia Sotnichenko | Dinara Ospanova
[1] Yuguang Fang,et al. Privacy-Preserving Verifiable Proximity Test for Location-Based Services , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[2] N. Cao,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[3] Erkay Savas,et al. An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking , 2014, Distributed and Parallel Databases.
[4] Marek Aleksander,et al. New Secure Block Cipher for Critical Applications: Design, Implementation, Speed and Security Analysis , 2019 .
[5] Samah Osama M. Kamel,et al. Mitigating the Impact of IoT Routing Attacks on Power Consumption in IoT Healthcare Environment using Convolutional Neural Network , 2020 .
[6] Rosario Gennaro,et al. Efficiently Verifiable Computation on Encrypted Data , 2014, CCS.
[7] Chi Zhang,et al. Verifiable Privacy-Preserving Aggregation in People-Centric Urban Sensing Systems , 2013, IEEE Journal on Selected Areas in Communications.
[8] Anders Carlsson,et al. Investigation of the IoT Device Lifetime with Secure Data Transmission , 2019, NEW2AN.
[9] Rosario Gennaro,et al. Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations , 2012, IACR Cryptol. ePrint Arch..
[10] Gebräuchliche Fertigarzneimittel,et al. V , 1893, Therapielexikon Neurologie.
[11] Roberto Tamassia,et al. Optimal Verification of Operations on Dynamic Sets , 2011, CRYPTO.
[12] P. Alam. ‘A’ , 2021, Composites Engineering: An A–Z Guide.
[13] Murat Kantarcioglu,et al. Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[14] Trent Jaeger,et al. Outlook: Cloudy with a Chance of Security Challenges and Improvements , 2010, IEEE Security & Privacy.
[15] Rosario Gennaro,et al. Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..
[16] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[17] Sergiy Gnatyuk,et al. Method of Traffic Monitoring for DDoS Attacks Detection in e-Health Systems and Networks , 2018, IDDM.
[18] Qinghua Li,et al. Efficient and Privacy-Aware Data Aggregation in Mobile Sensing , 2014, IEEE Transactions on Dependable and Secure Computing.