4.8 Article

PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT

Keping Yu et al.

Summary: This article proposes a blockchain-enhanced security access control scheme for IIoT in smart factories, which supports secure storage, access control, and tracking and revocation of malicious users.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

A Secure IoT-Based Modern Healthcare System With Fault-Tolerant Decision Making Process

Prosanta Gope et al.

Summary: The rise of the Internet of Things has led to increased information sharing among smart devices, with applications such as e-healthcare monitoring gaining wide attention. This paper proposes an enhanced system for designing a modern healthcare system based on IoT, addressing security and efficiency concerns in existing systems through the use of authentication and fault-tolerant decision-making schemes. Analyses show that the proposed scheme is more secure and efficient than existing systems, making it useful for designing an advanced IoT-based healthcare system.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2021)

Article Computer Science, Hardware & Architecture

Efficient and Privacy-Preserving Medical Research Support Platform Against COVID-19: A Blockchain-Based Approach

Keping Yu et al.

Summary: COVID-19 poses a major global public health challenge that is difficult to control completely in a short time. Medical research institutions face challenges in sharing privacy data for COVID-19 research, leading to the proposal of a blockchain-based medical research support platform to facilitate in-depth research and widespread application against COVID-19.

IEEE CONSUMER ELECTRONICS MAGAZINE (2021)

Article Automation & Control Systems

Privacy-Aware Data Fusion and Prediction With Spatial-Temporal Context for Smart City Industrial Environment

Lianyong Qi et al.

Summary: Smart cities generate a significant amount of industrial data related to transportation, healthcare, business, and social activities. Protecting user privacy, especially in terms of spatial-temporal context information, is crucial when integrating and analyzing this data. A novel privacy-aware data fusion and prediction approach based on locality-sensitive hashing technique is proposed in this article, showing better prediction performances compared to other methods through real-world dataset experiments.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems

K. Sowjanya et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2020)

Article Automation & Control Systems

Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence

Meng Hao et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Engineering, Electrical & Electronic

Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV

Chaosheng Feng et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Hardware & Architecture

MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning

Danish Vasan et al.

IEEE TRANSACTIONS ON COMPUTERS (2020)

Article Information Science & Library Science

AGE: authentication in gadget-free healthcare environments

Tanesh Kumar et al.

INFORMATION TECHNOLOGY & MANAGEMENT (2020)

Article Computer Science, Information Systems

Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system

Yang Yang et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks

Mengxia Shuai et al.

SECURITY AND COMMUNICATION NETWORKS (2019)

Article Computer Science, Information Systems

Dynamic multi-keyword based search algorithm using modified based fully homomorphic encryption and Prim's algorithm

D. Palanivel Rajan et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Hardware & Architecture

PEA: Parallel electrocardiogram-based authentication for smart healthcare systems

Yin Zhang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Theory & Methods

iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization

Yin Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Engineering, Electrical & Electronic

A Key Management Scheme for Secure Communications of Information Centric Advanced Metering Infrastructure in Smart Grid

Keping Yu et al.

IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT (2015)

Article Automation & Control Systems

Developing Vehicular Data Cloud Services in the IoT Environment

Wu He et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Computer Science, Hardware & Architecture

MEDiSN: Medical Emergency Detection in Sensor Networks

Jeonggil Ko et al.

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2010)

Article Computer Science, Theory & Methods

Oblivious keyword search

W Ogata et al.

JOURNAL OF COMPLEXITY (2004)