An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions
暂无分享,去创建一个
[1] Muttukrishnan Rajarajan,et al. Patient’s privacy protection with anonymous access to medical services , 2008, 2008 Second International Conference on Pervasive Computing Technologies for Healthcare.
[2] Thaier Hayajneh,et al. Security issues with certificate authorities , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).
[3] Daniel Slamanig,et al. The Degree of Privacy in Web-based Electronic Health Records , 2009 .
[4] Hyotaek Lim,et al. Security System in Cloud Computing for Medical Data Usage , 2013 .
[5] Pradeep Kumar Ray,et al. The Need for Technical Solutions for Maintaining the Privacy of EHR , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.
[6] Sajjan G. Shiva,et al. Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment , 2017, 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops).
[7] Noboru Sonehara,et al. Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.
[8] Rakesh Agrawal,et al. Securing electronic health records without impeding the flow of information , 2007, Int. J. Medical Informatics.
[9] Na Wang,et al. Privacy-Preserving in Healthcare Blockchain Systems Based on Lightweight Message Sharing , 2020, Sensors.
[10] Mohammad Ayoub Khan,et al. A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data , 2020, IEEE Access.
[11] Daniel Davis Wood,et al. ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .
[12] Ebru Gökalp,et al. Analysing Opportunities and Challenges of Integrated Blockchain Technologies in Healthcare , 2018, SIGSAND/PLAIS.
[13] Wen-Shenq Juang. RO-cash: An efficient and practical recoverable pre-paid offline e-cash scheme using bilinear pairings , 2010, J. Syst. Softw..
[14] Omar Almomani,et al. Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography , 2018, Int. Arab J. Inf. Technol..
[15] Henning Müller,et al. Strategies for health data exchange for secondary, cross-institutional clinical research , 2010, Comput. Methods Programs Biomed..
[16] Thomas Neubauer,et al. A methodology for the pseudonymization of medical data , 2011, Int. J. Medical Informatics.
[17] Ditipriya Sinha,et al. Authentication and Privacy Preservation in IoT Based Forest Fire Detection by Using Blockchain – A Review , 2019 .
[18] Randolph C. Barrows,et al. Review: Privacy, Confidentiality, and Electronic Medical Records , 1996, J. Am. Medical Informatics Assoc..
[19] Dongxi Liu,et al. Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications , 2019, IACR Cryptol. ePrint Arch..
[20] Ling Liu,et al. Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[21] Yanina Protskaya,et al. An anonymization protocol for the Internet of Things , 2017, 2017 International Symposium on Wireless Communication Systems (ISWCS).
[22] Sourav Mukhopadhyay,et al. A Mutual Authentication Framework for Wireless Medical Sensor Networks , 2017, Journal of Medical Systems.
[23] Alptekin Küpçü,et al. Research issues for privacy and security of electronic health services , 2017, Future Gener. Comput. Syst..
[24] Feng Xiang,et al. A Blockchain Privacy Protection Scheme Based on Ring Signature , 2020, IEEE Access.
[25] Luca Veltri,et al. mjCoAP: An Open-Source Lightweight Java CoAP Library for Internet of Things Applications , 2014, OpenIoT@SoftCOM.
[26] Thomas Neubauer,et al. A secure architecture for the pseudonymization of medical data , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[27] Jean Bacon,et al. A model of OASIS role-based access control and its support for active security , 2002, ACM Trans. Inf. Syst. Secur..
[28] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[29] Jinjun Chen,et al. Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions , 2019, Future Gener. Comput. Syst..
[30] Yuguang Fang,et al. PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[31] Seung Joo Kim,et al. Preserving Patient's Anonymity for Mobile Healthcare System in IoT Environment , 2016 .
[32] Gautam Srivastava,et al. A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.
[33] Gautam Srivastava,et al. Optimized Blockchain Model for Internet of Things based Healthcare Applications , 2019, 2019 42nd International Conference on Telecommunications and Signal Processing (TSP).
[34] Moayad Aloqaily,et al. An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.
[35] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[36] Carsten Bormann,et al. CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.
[37] Thaier Hayajneh,et al. Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring , 2018, Journal of Medical Systems.
[38] J. M. Eklund,et al. Blockchain Technology in Healthcare: A Systematic Review , 2019, Healthcare.
[39] Mohsen Guizani,et al. BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[40] Benjamin Fabian,et al. Secret Sharing for Health Data in Multi-provider Clouds , 2013, 2013 IEEE 15th Conference on Business Informatics.
[41] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[42] Dong Hoon Lee,et al. A Privacy-Strengthened Scheme for E-Healthcare Monitoring System , 2012, Journal of Medical Systems.
[43] C. Fidge,et al. Privacy-preserving electronic health record linkage using pseudonym identifiers , 2008, HealthCom 2008 - 10th International Conference on e-health Networking, Applications and Services.
[44] Md. Zakirul Alam Bhuiyan,et al. Privacy-friendly platform for healthcare data in cloud based on blockchain environment , 2019, Future Gener. Comput. Syst..
[45] David-Olivier Jaquet-Chiffelle,et al. Medical record search engines, using pseudonymised patient identity: An alternative to centralised medical records , 2011, Int. J. Medical Informatics.
[46] Gianluigi Ferrari,et al. Design and Deployment of an IoT Application-Oriented Testbed , 2015, Computer.
[47] Benjamin Fabian,et al. Collaborative and secure sharing of healthcare data in multi-clouds , 2015, Inf. Syst..
[48] Khalifa Toumi,et al. A novel data exploitation framework based on blockchain , 2020, Pervasive Mob. Comput..
[49] Jian Shen,et al. Future Generation Computer Systems , 2022 .
[50] Vipul Gupta,et al. Speeding up Secure Web Transactions Using Elliptic Curve Cryptography , 2004, NDSS.
[51] Shanlin Yang,et al. Blockchain-Based Medical Records Secure Storage and Medical Service Framework , 2018, Journal of Medical Systems.
[52] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[53] M. Eric Johnson,et al. Information security and privacy in healthcare: current state of research , 2010, Int. J. Internet Enterp. Manag..
[54] Gaurav Sharma,et al. A Survey of Healthcare Internet of Things (HIoT): A Clinical Perspective , 2020, IEEE Internet of Things Journal.
[55] Sachin Shetty,et al. Integrating blockchain for data sharing and collaboration in mobile healthcare applications , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[56] Silvio Micali,et al. How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design , 1986, CRYPTO.
[57] Agusti Solanas,et al. Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice , 2018, IEEE Access.
[58] Yuguang Fang,et al. Privacy and emergency response in e-healthcare leveraging wireless body sensor networks , 2010, IEEE Wireless Communications.