Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems
暂无分享,去创建一个
Xiaodong Lin | Nei Kato | Xuemin Shen | Rongxing Lu | Yoshiaki Nemoto | Xuemin Shen | N. Kato | R. Lu | Xiaodong Lin | Y. Nemoto
[1] Lynda L. McGhie,et al. THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT , 2004 .
[2] Liang Zhang,et al. Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[3] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[4] Feng Jiang,et al. Congestion Control in Multihop Wireless Networks , 2007, IEEE Transactions on Vehicular Technology.
[5] Fillia Makedon,et al. Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[6] S. Sastry,et al. Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[7] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[8] Chwan-Lu Tseng,et al. A Mobile Care System With Alert Mechanism , 2007, IEEE Transactions on Information Technology in Biomedicine.
[9] Madhav V. Marathe,et al. Parametric probabilistic sensor network routing , 2003, WSNA '03.
[10] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[11] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[12] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[13] Zhenfu Cao,et al. Efficient remote user authentication scheme using smart card , 2005, Comput. Networks.
[14] Birgit Pfitzmann,et al. Real-time mixes: a bandwidth-efficient anonymity protocol , 1998, IEEE J. Sel. Areas Commun..
[15] L. Gatzoulis,et al. Wearable and Portable eHealth Systems , 2007, IEEE Engineering in Medicine and Biology Magazine.
[16] K.K. Venkatasubramanian,et al. Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.
[17] Upkar Varshney,et al. Pervasive Healthcare and Wireless Health Monitoring , 2007, Mob. Networks Appl..
[18] Steven J. Murdoch,et al. Message Splitting Against the Partial Adversary , 2005, Privacy Enhancing Technologies.
[19] Donggang Liu,et al. Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.
[20] J. Muehlsteff,et al. Wireless Body Sensor Network for Continuous Cuff-less Blood Pressure Monitoring , 2006, 2006 3rd IEEE/EMBS International Summer School on Medical Devices and Biosensors.
[21] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[22] Yuan-Ting Zhang,et al. Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[23] Jean-Sébastien Coron,et al. On the Exact Security of Full Domain Hash , 2000, CRYPTO.
[24] Carl M. Harris,et al. Fundamentals of queueing theory (2nd ed.). , 1985 .
[25] Andreas Pfitzmann,et al. Networks Without User Observability: Design Options , 1985, EUROCRYPT.
[26] Kevin Fu,et al. Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..
[27] Hannes Federrath,et al. Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[28] Sandeep K. S. Gupta,et al. Security solutions for pervasive healthcare , 2007 .
[29] B. R. Badrinath,et al. Trajectory based forwarding and its applications , 2003, MobiCom '03.
[30] J. Limb,et al. Editorial on the IEEE/OSA Journal of Lightwave Technology and the IEEE Journal on Selected Areas in Communications , 1986 .
[31] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[32] Carl M. Harris,et al. Fundamentals of queueing theory , 1975 .
[33] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[34] Yang Xiao,et al. Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..
[35] Guang-Zhong Yang,et al. Pervasive body sensor network: an approach to monitoring the post-operative surgical patient , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).
[36] Victor Shoup,et al. OAEP Reconsidered , 2001, CRYPTO.
[37] Andreas Pfitzmann,et al. Networks without user observability , 1987, Comput. Secur..
[38] Cao Zhenfu. A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards , 2006 .
[39] Wendi B. Heinzelman,et al. Flooding Strategy for Target Discovery in Wireless Networks , 2003, MSWIM '03.
[40] Chong-Kwon Kim,et al. Flooding in wireless ad hoc networks , 2001, Comput. Commun..
[41] Dario Salvi,et al. A new solution for a heart failure monitoring system based on wearable and information technologies , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).
[42] Heinrich Planck,et al. Sensory baby vest for the monitoring of infants , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).
[43] Naranker Dulay,et al. Privacy Preserving Trust Negotiation for Pervasive Healthcare , 2006, 2006 Pervasive Health Conference and Workshops.
[44] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[45] Pin-Han Ho,et al. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[46] Ilias Iakovidis,et al. Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare record in Europe , 1998, Int. J. Medical Informatics.