E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption
暂无分享,去创建一个
Gunasekaran Manogaran | R. Varatharajan | Priyan Malarvizhi Kumar | M. K. Priyan | Vijayakumar Varadharajan | G Ushadevi | Prathamesh Vijay Tarare | Gunasekaran Manogaran | R. Varatharajan | G. Ushadevi | V. Vijayakumar | P. Tarare
[1] Cong Wang,et al. Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.
[2] Gunasekaran Manogaran,et al. Health data analytics using scalable logistic regression with stochastic gradient descent , 2018, Int. J. Adv. Intell. Paradigms.
[3] Jianfeng Wang,et al. Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE , 2014, 2014 Ninth International Conference on Broadband and Wireless Computing, Communication and Applications.
[4] Gunasekaran Manogaran,et al. Disease Surveillance System for Big Climate Data Processing and Dengue Transmission , 2017, Int. J. Ambient Comput. Intell..
[5] Ming Li,et al. Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2013, IEEE Transactions on Parallel and Distributed Systems.
[6] Vincenzo Iovino,et al. Hidden-Vector Encryption with Groups of Prime Order , 2008, Pairing.
[7] Gunasekaran Manogaran,et al. A survey of big data architectures and machine learning algorithms in healthcare , 2017 .
[8] Tadashi Fujita,et al. Influences of reduced masticatory sensory input from soft-diet feeding upon spatial memory/learning ability in mice. , 2007, Biomedical research.
[9] Sushil Jajodia,et al. Balancing confidentiality and efficiency in untrusted relational DBMSs , 2003, CCS '03.
[10] Wei Zhang,et al. Building Intelligent Transportation Cloud Data Center Based on SOA , 2017, Int. J. Ambient Comput. Intell..
[11] Cong Wang,et al. Security Challenges for the Public Cloud , 2012, IEEE Internet Computing.
[12] Ee-Chien Chang,et al. Indexing Encrypted Documents for Supporting Efficient Keyword Search , 2012, Secure Data Management.
[13] Gunasekaran Manogaran,et al. HIoTPOT: Surveillance on IoT Devices against Recent Threats , 2018, Wirel. Pers. Commun..
[14] Ching-Hsien Hsu,et al. Score level based latent fingerprint enhancement and matching using SIFT feature , 2018, Multimedia Tools and Applications.
[15] R. Varatharajan,et al. Competent resource provisioning and distribution techniques for cloud computing environment , 2017, Cluster Computing.
[16] Peishun Wang,et al. An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data , 2009, WISA.
[17] Ching-Hsien Hsu,et al. Machine Learning Based Big Data Processing Framework for Cancer Diagnosis Using Hidden Markov Model and GM Clustering , 2017, Wireless Personal Communications.
[18] Fan Wu,et al. A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.
[19] Daphne Lopez,et al. Assessment of Vaccination Strategies Using Fuzzy Multi-criteria Decision Making , 2015 .
[20] Gunasekaran Manogaran,et al. A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system , 2017, Future Gener. Comput. Syst..
[21] Xu An Wang,et al. Further observation on proxy re-encryption with keyword search , 2012, J. Syst. Softw..
[22] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[23] Jiguo Li,et al. Searchable ciphertext‐policy attribute‐based encryption with revocation in cloud storage , 2017, Int. J. Commun. Syst..
[24] Kaja Abbas,et al. Big Data Analytics in Healthcare Internet of Things , 2017 .
[25] Gunasekaran Manogaran,et al. Big Data Knowledge System in Healthcare , 2017 .
[26] Bo Zhang,et al. An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..
[27] Harpreet Kaur,et al. Spatial big data analytics of influenza epidemic in Vellore, India , 2014, 2014 IEEE International Conference on Big Data (Big Data).
[28] Gunasekaran Manogaran,et al. A Gaussian process based big data processing framework in cluster computing environment , 2017, Cluster Computing.
[29] Gunasekaran Manogaran,et al. Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System , 2018 .
[30] Gunasekaran Manogaran,et al. Chapter 12 - Parametric Model to Predict H1N1 Influenza in Vellore District, Tamil Nadu, India , 2017 .
[31] Xiao Zhi Gao,et al. An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images , 2017, Comput. Electr. Eng..
[32] Xiong Li,et al. A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city , 2017, Future Gener. Comput. Syst..
[33] Yun Ling,et al. Anonymous proxy re-encryption , 2012, Secur. Commun. Networks.
[34] Gunasekaran Manogaran,et al. RETRACTED ARTICLE: A big data classification approach using LDA with an enhanced SVM method for ECG signals in cloud computing , 2017, Multimedia Tools and Applications.
[35] Gunasekaran Manogaran,et al. Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis , 2017, Multimedia Tools and Applications.
[36] Gunasekaran Manogaran,et al. Wearable sensor devices for early detection of Alzheimer disease using dynamic time warping algorithm , 2018, Cluster Computing.
[37] Gunasekaran Manogaran,et al. Hybrid Recommendation System for Heart Disease Diagnosis based on Multiple Kernel Learning with Adaptive Neuro-Fuzzy Inference System , 2017, Multimedia Tools and Applications.
[38] Tim Mather,et al. Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance , 2009, Theory in practice.
[39] Naveen K. Chilamkurti,et al. Secure Disintegration Protocol for Privacy Preserving Cloud Storage , 2018, Wirel. Pers. Commun..
[40] Jie Wu,et al. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment , 2014, Inf. Sci..
[41] Gunasekaran Manogaran,et al. Modelling the H1N1 influenza using mathematical and neural network approaches , 2017 .
[42] Ming Li,et al. Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking , 2014, IEEE Trans. Parallel Distributed Syst..
[43] Dong Hoon Lee,et al. Difference Set Attacks on Conjunctive Keyword Search Schemes , 2006, Secure Data Management.
[44] Gunasekaran Manogaran,et al. Spatial cumulative sum algorithm with big data analytics for climate change detection , 2017, Comput. Electr. Eng..
[45] Ming Li,et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[46] Gunasekaran Manogaran,et al. Human-Computer Interaction With Big Data Analytics , 2018 .
[47] Gunasekaran Manogaran,et al. Intelligent face recognition and navigation system using neural learning for smart security in Internet of Things , 2017, Cluster Computing.
[48] Ying Wang,et al. Degradation and encryption for outsourced PNG images in cloud storage , 2016, Int. J. Grid Util. Comput..
[49] Xiong Li,et al. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.
[50] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[51] D. Lopez,et al. Climate change and disease dynamics - A big data perspective , 2016 .
[52] Gunasekaran Manogaran,et al. Architecture for Big Data Storage in Different Cloud Deployment Models , 2021, Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing.
[53] Qiong Huang,et al. A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release , 2013, ISPEC.
[54] Xiong Li,et al. A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments , 2018, J. Netw. Comput. Appl..
[55] Fabrice Kordon,et al. An approach for developing an interoperability mechanism between cloud providers , 2014, Int. J. Space Based Situated Comput..