3.8 Proceedings Paper

ICT in Healthcare: the role of IoT and the SECANT solution

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Multidisciplinary Sciences

Computerized history-taking improves data quality for clinical decision-making-Comparison of EHR and computer-acquired history data in patients with chest pain

David Zakim et al.

Summary: This study compares the completeness and accuracy of medical history data collected by physicians in the emergency room with data collected by computerized history-taking (CHT). The findings show that CHT is more complete and accurate than physician history-taking, but there are frequent factual inconsistencies between the two methods.

PLOS ONE (2021)

Proceedings Paper Computer Science, Information Systems

A Trust Management System for the IoT domain

Christos-Minas Mathas et al.

2020 IEEE WORLD CONGRESS ON SERVICES (SERVICES) (2020)

Proceedings Paper Computer Science, Information Systems

A crawler architecture for harvesting the clear, social, and dark web for IoT-related cyber-threat intelligence

Paris Koloveas et al.

2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019) (2019)

Article Biochemistry & Molecular Biology

Authenticating Health Activity Data Using Distributed Ledger Technologies

James Brogan et al.

COMPUTATIONAL AND STRUCTURAL BIOTECHNOLOGY JOURNAL (2018)

Article Computer Science, Theory & Methods

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing

Kaitai Liang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)

Article Computer Science, Theory & Methods

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing

Kaitai Liang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Computer Science, Information Systems

Searchable symmetric encryption: Improved definitions and efficient constructions

Reza Curtmola et al.

JOURNAL OF COMPUTER SECURITY (2011)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)