4.8 Article

A Fast Nearest Neighbor Search Scheme Over Outsourced Encrypted Medical Images

Related references

Note: Only part of the references are listed.
Article Automation & Control Systems

Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System

Haiping Huang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Automation & Control Systems

Computation Partitioning for Mobile Cloud Computing in a Big Data Environment

Jianqiang Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Computer Science, Theory & Methods

Searchable Symmetric Encryption: Designs and Challe

Geong Sen Poh et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Information Systems

Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner

Lu Zhou et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Theory & Methods

Secure and controllable k-NN query over encrypted cloud data with key confidentiality

Youwen Zhu et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2016)

Article Automation & Control Systems

Ubiquitous Data Accessing Method in IoT-Based Information System for Emergency Medical Services

Boyi Xu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Automation & Control Systems

A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor, and Intelligent Medicine Box

Geng Yang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Automation & Control Systems

Model-Driven Safety Analysis of Closed-Loop Medical Systems

Miroslav Pajic et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Computer Science, Information Systems

Searchable symmetric encryption: Improved definitions and efficient constructions

Reza Curtmola et al.

JOURNAL OF COMPUTER SECURITY (2011)

Article Computer Science, Information Systems

iDistance:: An adaptive B+-tree based indexing method for nearest neighbor search

HV Jagadish et al.

ACM TRANSACTIONS ON DATABASE SYSTEMS (2005)