Cryptographic security models for eHealth P2P database management systems network
暂无分享,去创建一个
H. T. Mouftah | Khalil El-Khatib | Eiji Okamoto | Carlisle M. Adams | Sk. Md. Mizanur Rahman | Mehedi Masud
[1] Catriel Beeri,et al. A Proof Procedure for Data Dependencies , 1984, JACM.
[2] Renée J. Miller,et al. Mapping data in peer-to-peer systems: semantics and algorithmic issues , 2003, SIGMOD '03.
[3] John Mylopoulos,et al. Data Sharing in the Hyperion Peer Database System , 2005, VLDB.
[4] Diana K. Smetters,et al. Secret handshakes from pairing-based key agreements , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Jie Zhao,et al. Schema Mediation in Peer Data Management Systems , 2011, Int. J. Cooperative Inf. Syst..
[6] Sanjit Chatterjee,et al. On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings , 2010, WAIFI.
[7] A. Taleb-Bendiab,et al. E-health support services based on service-oriented architecture , 2006, IT Professional.
[8] Michael Scott,et al. A Taxonomy of Pairing-Friendly Elliptic Curves , 2010, Journal of Cryptology.
[9] Phokion G. Kolaitis,et al. Peer data exchange , 2005, PODS '05.
[10] Dan Suciu,et al. The Piazza peer data management system , 2004, IEEE Transactions on Knowledge and Data Engineering.
[11] Marcus Stögbauer. Efficient Algorithms for Pairing-Based Cryptosystems , 2004 .
[12] Mehedi Masud,et al. Don't Mind Your Vocabulary: Data Sharing Across Heterogeneous Peers , 2005, OTM Conferences.
[13] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[14] Dan Suciu,et al. Schema mediation in peer data management systems , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[15] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.