Cost-effective secure E-health cloud system using identity based cryptographic techniques
Top Cited Papers
Open Access
- 1 February 2017
- journal article
- Published by Elsevier BV in Future Generation Computer Systems
- Vol. 67, 242-254
- https://doi.org/10.1016/j.future.2016.08.008
Abstract
No abstract availableKeywords
Funding Information
- Natural Science Foundation of Shaanxi Province (2014JM8300, 2014JQ8358, 2014JQ8307)
- Changjiang Scholars and Innovation Research Team in University (IRT 1078)
- Key Problem of NFSC-Guangdong Union Foundation (U1135002)
- Major Nature Science Foundation of China (61370078)
- China 863 Project (2015AA016007)
- Fundamental Research Funds for the Center Universities (JY10000903001)
- Nature Science Foundation of China (61103230, 61272492, 61202492, 61572390, 61370224)
- China 111 Project (B08038)
This publication has 19 references indexed in Scilit:
- Secure Deduplication with Efficient and Reliable Convergent Key ManagementIEEE Transactions on Parallel and Distributed Systems, 2013
- Securely Outsourcing Attribute-Based Encryption with CheckabilityIEEE Transactions on Parallel and Distributed Systems, 2013
- A new patient monitoring framework and Energy-aware Peering Routing Protocol (EPR) for Body Area Network communicationJournal of Ambient Intelligence and Humanized Computing, 2013
- Security and privacy in electronic health records: A systematic literature reviewJournal of Biomedical Informatics, 2013
- Identity-based data storage in cloud computingFuture Generation Computer Systems, 2013
- SCCR: a generic approach to simultaneously achieve CCA security and collusion‐resistance in proxy re‐encryptionSecurity and Communication Networks, 2011
- ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computingInternational Journal of Security and Networks, 2011
- Multi-use and unidirectional identity-based proxy re-encryption schemesInformation Sciences, 2010
- Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner SettingsPublished by Springer Science and Business Media LLC ,2010
- A tapestry of identity-based encryption: practical frameworks comparedInternational Journal of Applied Cryptography, 2008