标题
E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption
作者
关键词
AES encryption, Cloud computing, Proxy re-encryption, Big data encryption, Cloud security, Electronic health records
出版物
MOBILE NETWORKS & APPLICATIONS
Volume -, Issue -, Pages -
出版商
Springer Nature
发表日期
2018-05-21
DOI
10.1007/s11036-018-1060-9
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
- (2018) Xiong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Score level based latent fingerprint enhancement and matching using SIFT feature
- (2018) Adhiyaman Manickam et al. MULTIMEDIA TOOLS AND APPLICATIONS
- HIoTPOT: Surveillance on IoT Devices against Recent Threats
- (2018) Usha Devi Gandhi et al. WIRELESS PERSONAL COMMUNICATIONS
- A Robust ECC based Provable Secure Authentication Protocol with Privacy Protection for Industrial Internet of Things
- (2017) Xiong Li et al. IEEE Transactions on Industrial Informatics
- Visual analysis of geospatial habitat suitability model based on inverse distance weighting with paired comparison analysis
- (2017) R. Varatharajan et al. MULTIMEDIA TOOLS AND APPLICATIONS
- An adaptive decision based kriging interpolation algorithm for the removal of high density salt and pepper noise in images
- (2017) R. Varatharajan et al. COMPUTERS & ELECTRICAL ENGINEERING
- Climate change and disease dynamics - A big data perspective
- (2016) D. Lopez et al. INTERNATIONAL JOURNAL OF INFECTIOUS DISEASES
- Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage
- (2015) Jiguo Li et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking
- (2013) Wenhai Sun et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Security Challenges for the Public Cloud
- (2012) Kui Ren et al. IEEE INTERNET COMPUTING
- Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
- (2012) Qin Liu et al. INFORMATION SCIENCES
- Further observation on proxy re-encryption with keyword search
- (2011) Xu An Wang et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Anonymous proxy re-encryption
- (2011) Jun Shao et al. Security and Communication Networks
- An efficient public key encryption with conjunctive-subset keywords search
- (2010) Bo Zhang et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Find the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
SearchAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now