Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A comprehensive survey on security and privacy for electronic health data
Recently, the integration of state-of-the-art technologies, such as modern sensors, networks,
and cloud computing, has revolutionized the conventional healthcare system. However …
and cloud computing, has revolutionized the conventional healthcare system. However …
Realizing an internet of secure things: A survey on issues and enabling technologies
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
Secure cloud-based EHR system using attribute-based cryptosystem and blockchain
H Wang, Y Song - Journal of medical systems, 2018 - Springer
To achieve confidentiality, authentication, integrity of medical data, and support fine-grained
access control, we propose a secure electronic health record (EHR) system based on …
access control, we propose a secure electronic health record (EHR) system based on …
A secure and efficient ciphertext-policy attribute-based signcryption for personal health records sharing in cloud computing
YS Rao - Future Generation Computer Systems, 2017 - Elsevier
Abstract In recent years, Personal Health Record (PHR) system has attracted intensive
attention due to its universal accessibility and low cost. The practical deployment of PHR …
attention due to its universal accessibility and low cost. The practical deployment of PHR …
LH-ABSC: A lightweight hybrid attribute-based signcryption scheme for cloud-fog-assisted IoT
One of the best ways to deal with the massive data generated by the Internet of Things (IoT)
is storing them in the cloud. However, outsourced storage raises some security and privacy …
is storing them in the cloud. However, outsourced storage raises some security and privacy …
Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption
Q Xu, C Tan, Z Fan, W Zhu, Y **ao, F Cheng - IEEE Access, 2018 - ieeexplore.ieee.org
Nowadays, secure data access control has become one of the major concerns in a cloud
storage system. As a logical combination of attribute-based encryption and attribute-based …
storage system. As a logical combination of attribute-based encryption and attribute-based …
Ciphertext-policy attribute-based signcryption with verifiable outsourced designcryption for sharing personal health records
F Deng, Y Wang, L Peng, H **ong, J Geng, Z Qin - IEEe Access, 2018 - ieeexplore.ieee.org
Personal health record (PHR) is a patient-centric model of health information exchange,
which greatly facilitates the storage, access, and share of personal health information. In …
which greatly facilitates the storage, access, and share of personal health information. In …
Efficient privacy-preserving access control scheme in electronic health records system
Y Ming, T Zhang - Sensors, 2018 - mdpi.com
The sharing of electronic health records (EHR) in cloud servers is an increasingly important
development that can improve the efficiency of medical systems. However, there are several …
development that can improve the efficiency of medical systems. However, there are several …
A pairing-based cryptographic approach for data security in the cloud
This paper presents AES4SeC, a security scheme fully constructed over cryptographic
pairings. The main building blocks of AES4SeC are attribute-based encryption (ABE) and …
pairings. The main building blocks of AES4SeC are attribute-based encryption (ABE) and …
Secure data access control for fog computing based on multi-authority attribute-based signcryption with computation outsourcing and attribute revocation
Q Xu, C Tan, Z Fan, W Zhu, Y **ao, F Cheng - Sensors, 2018 - mdpi.com
Nowadays, fog computing provides computation, storage, and application services to end
users in the Internet of Things. One of the major concerns in fog computing systems is how …
users in the Internet of Things. One of the major concerns in fog computing systems is how …