相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Computerized history-taking improves data quality for clinical decision-making-Comparison of EHR and computer-acquired history data in patients with chest pain
David Zakim et al.
PLOS ONE (2021)
A Trust Management System for the IoT domain
Christos-Minas Mathas et al.
2020 IEEE WORLD CONGRESS ON SERVICES (SERVICES) (2020)
Designing a Distributed Ledger Technology System for Interoperable and General Data Protection Regulation-Compliant Health Data Exchange: A Use Case in Blood Glucose Data
David Hawig et al.
JOURNAL OF MEDICAL INTERNET RESEARCH (2019)
A crawler architecture for harvesting the clear, social, and dark web for IoT-related cyber-threat intelligence
Paris Koloveas et al.
2019 IEEE WORLD CONGRESS ON SERVICES (IEEE SERVICES 2019) (2019)
Authenticating Health Activity Data Using Distributed Ledger Technologies
James Brogan et al.
COMPUTATIONAL AND STRUCTURAL BIOTECHNOLOGY JOURNAL (2018)
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
Kaitai Liang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing
Kaitai Liang et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)
Searchable symmetric encryption: Improved definitions and efficient constructions
Reza Curtmola et al.
JOURNAL OF COMPUTER SECURITY (2011)
Ciphertext-policy attribute-based encryption
John Bethencourt et al.
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)