Secure and Privacy Preserving Mobile Healthcare Data Exchange Using Cloud Service
暂无分享,去创建一个
Praveen Khethavath | Doyel Pal | Gobinda Senchury | Doyel Pal | Gobinda Senchury | Praveen Khethavath
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] D. Gans,et al. Medical groups' adoption of electronic health records and information systems. , 2005, Health affairs.
[4] G Kambourakis,et al. PKI-based secure mobile access to electronic health services and data. , 2005, Technology and health care : official journal of the European Society for Engineering and Medicine.
[5] Joseph M. Woodside. EDI and ERP: A Real-Time Framework for HealthCare Data Exchange , 2007, Journal of Medical Systems.
[6] Jen-Her Wu,et al. Mobile computing acceptance factors in the healthcare industry : A structural equation model , 2006 .
[7] Eric Horvitz,et al. Patient Controlled Encryption: Patient Privacy in Electronic Medical Records , 2009 .
[8] Sowmya R. Rao,et al. Use of electronic health records in U.S. hospitals. , 2009, The New England journal of medicine.
[9] Eric Horvitz,et al. Patient controlled encryption: ensuring privacy of electronic medical records , 2009, CCSW '09.
[10] Ming Li,et al. Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.
[11] Reihaneh Safavi-Naini,et al. Privacy preserving EHR system using attribute-based infrastructure , 2010, CCSW '10.
[12] Xiaodong Lin,et al. SDSM: A secure data service mechanism in mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[13] N. Menachemi,et al. Benefits and drawbacks of electronic health record systems , 2011 .
[14] Flora Malamateniou,et al. Enabling data protection through PKI encryption in IoT m-Health devices , 2012, 2012 IEEE 12th International Conference on Bioinformatics & Bioengineering (BIBE).
[15] Yuguang Fang,et al. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring , 2013, IEEE Transactions on Information Forensics and Security.
[16] Xiaodong Lin,et al. SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.
[17] J. Boruff,et al. Mobile devices in medicine: a survey of how medical students, residents, and faculty use smartphones and other mobile devices to find information. , 2014, Journal of the Medical Library Association : JMLA.
[18] Mirza Mansoor Baig,et al. Mobile healthcare applications: system design review, critical issues and challenges , 2014, Australasian Physical & Engineering Sciences in Medicine.
[19] Yuguang Fang,et al. A Privacy-Preserving Attribute-Based Authentication System for Mobile Health Networks , 2014, IEEE Transactions on Mobile Computing.
[20] M. Anwar Hossain,et al. Privacy preserving secure data exchange in mobile P2P cloud healthcare environment , 2016, Peer-to-Peer Netw. Appl..