A blockchain-based scheme for privacy-preserving and secure sharing of medical data (English)
- New search for: Huang, Haiping
- New search for: Zhu, Peng
- New search for: Xiao, Fu
- New search for: Sun, Xiang
- New search for: Huang, Qinglong
- New search for: Huang, Haiping
- New search for: Zhu, Peng
- New search for: Xiao, Fu
- New search for: Sun, Xiang
- New search for: Huang, Qinglong
In:
Computers and Security
;
99
;
2020
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:A blockchain-based scheme for privacy-preserving and secure sharing of medical data
-
Contributors:Huang, Haiping ( author ) / Zhu, Peng ( author ) / Xiao, Fu ( author ) / Sun, Xiang ( author ) / Huang, Qinglong ( author )
-
Published in:
-
Publication date:2020-08-14
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 99
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
FIT: Inspect vulnerabilities in cross-architecture firmware by deep learning and bipartite matchingLiang, Hongliang / Xie, Zhuosi / Chen, Yixiu / Ning, Hua / Wang, Jianli et al. | 2020
-
Differential privacy protection over deep learning: An investigation of its impacted factorsLin, Ying / Bao, Ling-Yan / Li, Ze-Minghui / Si, Shu-Zheng / Chu, Chao-Hsien et al. | 2020
-
Deep autoencoders as anomaly detectors: Method and case study in a distributed water treatment plantGauthama Raman, M.R. / Dong, Wenjie / Mathur, Aditya et al. | 2020
-
Editorial Board| 2019
-
A first look at forensic analysis of sailfishosTzvetanov, Krassimir / Karabiyik, Umit et al. | 2020
-
Assessing country-level privacy risk for digital payment systemsAkanfe, Oluwafemi / Valecha, Rohit / Rao, H. Raghav et al. | 2020
-
Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detectionPrasad, Mahendra / Tripathi, Sachin / Dahal, Keshav et al. | 2020
-
Detecting personally identifiable information transmission in android applications using light-weight static analysisWongwiwatchai, Nattanon / Pongkham, Phannawhat / Sripanidkulchai, Kunwadee et al. | 2020
-
Requirements for computerized tools to design information security policiesRostami, Elham / Karlsson, Fredrik / Gao, Shang et al. | 2020
-
Investigating the vulnerability fixing process in OSS projects: Peculiarities and challengesCanfora, Gerardo / Di Sorbo, Andrea / Forootani, Sara / Pirozzi, Antonio / Visaggio, Corrado Aaron et al. | 2020
-
ADSAD: An unsupervised attention-based discrete sequence anomaly detection framework for network security analysisQin, Zhi-Quan / Ma, Xing-Kong / Wang, Yong-Jun et al. | 2020
-
An improved rule induction based denial of service attacks classification modelMohammad, Rami Mustafa A. / Alsmadi, Mutasem K. / Almarashdeh, Ibrahim / Alzaqebah, Malek et al. | 2020
-
Recurrent neural network for detecting malwareJha, Sudan / Prashar, Deepak / Long, Hoang Viet / Taniar, David et al. | 2020
-
Politeness in security directives: Insights in browser compliance for the human elementHouse, Deanna / Giordano, Gabe et al. | 2020
-
LogDoS: A Novel logging-based DDoS prevention mechanism in path identifier-Based information centric networksAl-Duwairi, Basheer / Özkasap, Öznur / Uysal, Ahmet / Kocaoğullar, Ceren / Yildirim, Kaan et al. | 2020
-
Consensus versus warfare – unveiling discourses in de jure information security standard developmentAndersson, Annika / Karlsson, Fredrik / Hedström, Karin et al. | 2020
-
Explaining the interactions of humans and artifacts in insider security behaviors: The mangle of practice perspectiveVan Slyke, Craig / Belanger, France et al. | 2020
-
A blockchain-based scheme for privacy-preserving and secure sharing of medical dataHuang, Haiping / Zhu, Peng / Xiao, Fu / Sun, Xiang / Huang, Qinglong et al. | 2020
-
Are public intrusion datasets fit for purpose characterising the state of the art in intrusion event datasetsKenyon, A. / Deka, L. / Elizondo, D. et al. | 2020
-
Information security governance challenges and critical success factors: Systematic reviewAlGhamdi, Sultan / Win, Khin Than / Vlahu-Gjorgievska, Elena et al. | 2020
-
A framework for effective corporate communication after cyber security incidentsKnight, Richard / Nurse, Jason R.C. et al. | 2020
-
A graph proximity feature augmentation approach for identifying accounts of terrorists on twitterAleroud, Ahmed / Abu-Alsheeh, Nisreen / Al-Shawakfa, Emad et al. | 2020
-
Gender bias and the impact on managerial evaluation of insider security threatsGiddens, Laurie / Amo, Laura C. / Cichocki, Dianna et al. | 2020
-
Semantics-aware obfuscation scheme prediction for binaryZhao, Yujie / Tang, Zhanyong / Ye, Guixin / Peng, Dongxu / Fang, Dingyi / Chen, Xiaojiang / Wang, Zheng et al. | 2020
-
NSAPs: A novel scheme for network security state assessment and attack predictionZhan, Mengqi / Li, Yang / Yang, Xinghua / Cui, Wenjing / Fan, Yulin et al. | 2020
-
A zero-knowledge-proof-based digital identity management scheme in blockchainYang, Xiaohui / Li, Wenjie et al. | 2020
-
Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical imagesGuo, Cheng / Jia, Jing / Choo, Kim-Kwang Raymond / Jie, Yingmo et al. | 2020
-
A trusted feature aggregator federated learning for distributed malicious attack detectionHei, Xinhong / Yin, Xinyue / Wang, Yichuan / Ren, Ju / Zhu, Lei et al. | 2020
-
AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchainShao, Wei / Jia, Chunfu / Xu, Yunkai / Qiu, Kefan / Gao, Yan / He, Yituo et al. | 2020
-
Shoulder surfing experiments: A systematic literature reviewBošnjak, Leon / Brumen, Boštjan et al. | 2020
-
LOPA: A linear offset based poisoning attack method against adaptive fingerprint authentication systemXue, Mingfu / He, Can / Wang, Jian / Liu, Weiqiang et al. | 2020
-
De-Wipimization: Detection of data wiping traces for investigating NTFS file systemOh, Dong Bin / Park, Kyung Ho / Kim, Huy Kang et al. | 2020
-
An exploratory examination of organizational insiders’ descriptive and normative perceptions of cyber-relevant rights and responsibilitiesPosey, Clay / Folger, Robert et al. | 2020
-
Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networksSun, Xiaoqing / Wang, Zhiliang / Yang, Jiahai / Liu, Xinran et al. | 2020