A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System
暂无分享,去创建一个
[1] Tooska Dargahi,et al. PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications , 2020, Future Gener. Comput. Syst..
[2] Rajeev Kumar,et al. Healthcare Data Breaches: Insights and Implications , 2020, Healthcare.
[3] R. Somasundaram,et al. Review of security challenges in healthcare internet of things , 2020, Wireless Networks.
[4] Manju Khari,et al. Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[5] Tatsuya Suzuki,et al. Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings , 2019, 2019 Seventh International Symposium on Computing and Networking (CANDAR).
[6] A. Dehghantanha,et al. Threats on the horizon: understanding security threats in the era of cyber-physical systems , 2019, The Journal of Supercomputing.
[7] Abdullatif Shikfa,et al. Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices , 2019, ICFNDS.
[8] Neyire Deniz Sarier. Multimodal biometric Identity Based Encryption , 2018, Future Gener. Comput. Syst..
[9] M. Shamim Hossain,et al. A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography , 2017, IEEE Access.
[10] Mohammad Hammoudeh,et al. A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT , 2017, ICFNDS.
[11] Allison Bishop,et al. Why Proving HIBE Systems Secure Is Difficult , 2014, EUROCRYPT.
[12] Marina Blanton,et al. Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.
[13] Lifang Wu,et al. A novel key generation cryptosystem based on face features , 2010, IEEE 10th INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS.
[14] Kenneth G. Paterson,et al. Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..
[15] B. Chen,et al. Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).
[16] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[17] Yan Zhang,et al. On the Euclidean distance of images , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[18] Brent Waters. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[19] Dan Boneh,et al. Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.
[20] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[21] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[22] Byron Oviedo,et al. The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016) Patient Monitoring System Based on Internet of Things , 2016 .
[23] Girish. Identity-Based Cryptography and Comparison with traditional Public key Encryption : A Survey , 2014 .
[24] Yao Zheng,et al. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.