On the protection of consumer genomic data in the Internet of Living Things
暂无分享,去创建一个
Alfredo De Santis | Bruno Carpentieri | Francesco Palmieri | Raffaele Pizzolante | Aniello Castiglione | Arcangelo Castiglione | A. D. Santis | Arcangelo Castiglione | Aniello Castiglione | F. Palmieri | Raffaele Pizzolante | B. Carpentieri
[1] Kim-Kwang Raymond Choo,et al. Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds , 2016, Journal of Medical Systems.
[2] Zhe Liu,et al. Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions , 2017, Comput. Secur..
[3] Kim-Kwang Raymond Choo,et al. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification , 2017, IEEE Transactions on Information Forensics and Security.
[4] Donghyun Kim,et al. A new outsourcing conditional proxy re‐encryption suitable for mobile cloud environment , 2017, Concurr. Comput. Pract. Exp..
[5] Anirban Basu,et al. Privacy-friendly secure bidding for smart grid demand-response , 2017, Inf. Sci..
[6] Kim-Kwang Raymond Choo,et al. A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.
[7] Alfredo De Santis,et al. On the Protection of fMRI Images in Multi-domain Environments , 2015, 2015 IEEE 29th International Conference on Advanced Information Networking and Applications.
[8] Marek R. Ogiela,et al. Grammar Encoding in DNA-Like Secret Sharing Infrastructure , 2010, AST/UCMA/ISA/ACN.
[9] Bruno Carpentieri,et al. Lossless, low-complexity, compression of three-dimensional volumetric medical images via linear prediction , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).
[10] Alfredo De Santis,et al. Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes , 2016, IEEE Transactions on Dependable and Secure Computing.
[11] Alfredo De Santis,et al. On-Board Format-Independent Security of Functional Magnetic Resonance Images , 2017, ACM Trans. Embed. Comput. Syst..
[12] Bruno Carpentieri,et al. Text Compression and Encryption through Smart Devices for Mobile Communication , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[13] Andelka M. Phillips,et al. ‘Only a click away — DTC genetics for ancestry, health, love…and more: A view of the business and regulatory landscape’ , 2016, Applied & translational genomics.
[14] Akiyoshi Wakatani,et al. Digital watermarking for ROI medical images by using compressed signature image , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[15] Roberto Caldelli,et al. Reversible Watermarking Techniques: An Overview and a Classification , 2010, EURASIP J. Inf. Secur..
[16] Yaniv Erlich. A vision for ubiquitous sequencing , 2015, bioRxiv.
[17] Alfredo De Santis,et al. Cloud-based adaptive compression and secure management services for 3D healthcare data , 2015, Future Gener. Comput. Syst..
[18] Athanasios V. Vasilakos,et al. Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing , 2017, IEEE Transactions on Big Data.
[19] Bruno Carpentieri,et al. The AVQ Algorithm: Watermarking and Compression Performances , 2011, 2011 Third International Conference on Intelligent Networking and Collaborative Systems.
[20] A. Bovik,et al. A universal image quality index , 2002, IEEE Signal Processing Letters.
[21] Ajay N. Jain,et al. Fully automatic quantification of microarray image data. , 2002, Genome research.
[22] Christian Roux,et al. Reversible Watermarking for Knowledge Digest Embedding and Reliability Control in Medical Images , 2009, IEEE Transactions on Information Technology in Biomedicine.
[23] Yu Luo,et al. Gridding and compression of microarray images , 2004, Proceedings. 2004 IEEE Computational Systems Bioinformatics Conference, 2004. CSB 2004..
[24] Roy D. Sleator,et al. 'Big data', Hadoop and cloud computing in genomics , 2013, J. Biomed. Informatics.
[25] Melanie Swan,et al. Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.0 , 2012, J. Sens. Actuator Networks.
[26] Ilsun You,et al. A Secure Distributed Video Surveillance System Based on Portable Devices , 2012, CD-ARES.
[27] Ilsun You,et al. Secure and distributed video surveillance via portable devices , 2014, J. Ambient Intell. Humaniz. Comput..
[28] Zhou Wang,et al. Why is image quality assessment so difficult? , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[29] Jeffrey G. Andrews,et al. What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.
[30] Mauro Barni,et al. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .
[31] Jin Li,et al. Hierarchical and Shared Access Control , 2016, IEEE Transactions on Information Forensics and Security.
[32] Xinyi Huang,et al. Cryptographic Hierarchical Access Control for Dynamic Structures , 2016, IEEE Transactions on Information Forensics and Security.
[33] Nilanjan Dey,et al. Internet of Things and Big Data Technologies for Next Generation Healthcare , 2017 .
[34] Alfredo De Santis,et al. Hierarchical and Shared Key Assignment , 2014, 2014 17th International Conference on Network-Based Information Systems.
[35] Iuon-Chang Lin,et al. Reversible Watermarking: Current Status and Key Issues , 2006, Int. J. Netw. Secur..
[36] Osamah M. Al-Qershi,et al. Authentication and Data Hiding Using a Hybrid ROI-Based Watermarking Scheme for DICOM Images , 2011, Journal of Digital Imaging.
[37] Bruno Carpentieri,et al. A Secure Low Complexity Approach for Compression and Transmission of 3-D Medical Images , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.
[38] J. Murray,et al. Personalized medicine: been there, done that, always needs work! , 2012, American journal of respiratory and critical care medicine.
[39] Ton Kalker,et al. Reversible Image Watermarking Based on Integer-to-Integer Wavelet Transform , 2007, IEEE Transactions on Information Forensics and Security.
[40] A. Nordgren,et al. Can genomics tell me who I am? Essentialistic rhetoric in direct-to-consumer DNA testing , 2009 .
[41] Sheikh Iqbal Ahamed,et al. A privacy preserving framework for RFID based healthcare systems , 2017, Future Gener. Comput. Syst..
[42] Salim Hariri,et al. IoT Security Framework for Smart Cyber Infrastructures , 2016, 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W).
[43] Alfredo De Santis,et al. Protection of Microscopy Images through Digital Watermarking Techniques , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.