(a,k)-Anonymous Scheme for Privacy-Preserving Data Collection in IoT-based Healthcare Services Systems
暂无分享,去创建一个
Jie Wang | Hongtao Li | Feng Guo | Wenyin Zhang | Jinsheng Xing | Wenyin Zhang | Hongtao Li | Feng Guo | Jie Wang | Jinsheng Xing
[1] Sanjay Kumar,et al. An Efficient Key Distribution Scheme for Wireless Sensor Networks using polynomial based schemes , 2022 .
[2] Shaopeng Guan,et al. Privacy-Preserving Health Data Collection for Preschool Children , 2013, Comput. Math. Methods Medicine.
[3] S. A. Sahaaya Arul Mary,et al. Preserving Privacy in Health Care Information: A Memetic Approach , 2016 .
[4] S Lakshmi. Secure Encrypted-Data Routing Protocol for Wireless Sensor Networks , 2012 .
[5] Kemal Akkaya,et al. Efficient Privacy-Preserving Data Collection Scheme for Smart Grid AMI Networks , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[6] Manish Manoria,et al. A survey on privacy preserving mining implementing techniques , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).
[7] Jian Shen,et al. Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems , 2018, J. Ambient Intell. Humaniz. Comput..
[8] Xuemin Shen,et al. Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.
[9] Sheikh Iqbal Ahamed,et al. PriDaC: Privacy Preserving Data Collection in Sensor Enabled RFID Based Healthcare Services , 2014, 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering.
[10] Shaoen Wu,et al. Dynamic Trust Relationships Aware Data Privacy Protection in Mobile Crowd-Sensing , 2018, IEEE Internet of Things Journal.
[11] R. Sugumar,et al. Conditional Entropy with Swarm Optimization Approach for Privacy Preservation of Datasets in Cloud , 2016 .
[12] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[13] Jianfeng Ma,et al. A privacy-preserving data collection model for digital community , 2015, Science China Information Sciences.
[14] L. Cox. Suppression Methodology and Statistical Disclosure Control , 1980 .
[15] Xin Jin,et al. ASAP: Eliminating algorithm-based disclosure in privacy-preserving data publishing , 2011, Inf. Syst..
[16] Muhammad Khurram Khan,et al. User authentication schemes for wireless sensor networks: A review , 2015, Ad Hoc Networks.
[17] Adam Meyerson,et al. On the complexity of optimal K-anonymity , 2004, PODS.
[18] Guangjun Liu,et al. RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data , 2017, Mobile Networks and Applications.
[19] Xiaodong Lin,et al. Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.
[20] Myungae Chung,et al. SHOES : Secure Healthcare Oriented Environement Service Model , 2006, 2006 IEEE Biomedical Circuits and Systems Conference.
[21] Catherine Blake,et al. UCI Repository of machine learning databases , 1998 .
[22] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[23] Xiong Li,et al. A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).
[24] Sivaraman.,et al. Privacy Preserving Web Search by Client Side Generalization of User Profile , 2015, Asian Journal of Computer Science and Technology.
[25] Saru Kumari. Design flaws of “an anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography” , 2016, Multimedia Tools and Applications.
[26] Raymond Chi-Wing Wong,et al. (α, k)-anonymous data publishing , 2009, Journal of Intelligent Information Systems.
[27] Xiaojun Zhang,et al. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety , 2015, Journal of Medical Systems.
[28] Cheng-Chi Lee,et al. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems , 2016, Journal of Medical Systems.
[29] Cheng-Chi Lee,et al. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.
[30] Xin Jin,et al. Algorithm-safe privacy-preserving data publishing , 2010, EDBT '10.
[31] Chun-Shien Lu,et al. Privacy-preserving data collection and recovery of compressive sensing , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).
[32] Chao Yang,et al. Efficient end-to-end authentication protocol for wearable health monitoring systems , 2017, Comput. Electr. Eng..
[33] Vijay S. Iyengar,et al. Transforming data to satisfy privacy constraints , 2002, KDD.
[34] Athanasios V. Vasilakos,et al. An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps , 2013, Journal of Medical Systems.
[35] Wei Zhao,et al. A new scheme on privacy-preserving data classification , 2005, KDD '05.