A secure blockchain-based e-health records storage and sharing scheme (English)
- New search for: Shamshad, Salman
- New search for: Minahil
- New search for: Mahmood, Khalid
- New search for: Kumari, Saru
- New search for: Chen, Chien-Ming
- New search for: Shamshad, Salman
- New search for: Minahil
- New search for: Mahmood, Khalid
- New search for: Kumari, Saru
- New search for: Chen, Chien-Ming
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:A secure blockchain-based e-health records storage and sharing scheme
-
Contributors:Shamshad, Salman ( author ) / Minahil ( author ) / Mahmood, Khalid ( author ) / Kumari, Saru ( author ) / Chen, Chien-Ming ( author )
-
Publication date:2020-01-01
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 55
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A surveyBabaghayou, Messaoud / Labraoui, Nabila / Abba Ari, Ado Adamou / Lagraa, Nasreddine / Ferrag, Mohamed Amine et al. | 2020
-
Detection of distributed denial of service attacks based on information theoretic approach in time series modelsDavid, Jisa / Thomas, Ciza et al. | 2020
-
Automated exploration of homomorphic encryption scheme input parametersFeron, Cyrielle / Lagadec, Loïc / Lapôtre, Vianney et al. | 2020
-
A Lightweight Signcryption Method for Perception Layer in Internet-of-ThingsKumar, Ashish / Saha, Rahul / Alazab, Mamoun / Kumar, Gulshan et al. | 2020
-
A comparison of two hybrid ensemble techniques for network anomaly detection in spark distributed environmentKaur, Gagandeep et al. | 2020
-
Efficient protocols for private wildcards pattern matchingSaha, Tushar Kanti / Rathee, Deevashwer / Koshiba, Takeshi et al. | 2020
-
Application design phase risk assessment framework using cloud security domainsSen, Amartya / Madria, Sanjay et al. | 2020
-
Robustness verification of soft security systemsBidgoly, Amir Jalaly et al. | 2020
-
Real-time and private spatio-temporal data aggregation with local differential privacyXiong, Xingxing / Liu, Shubo / Li, Dan / Cai, Zhaohui / Niu, Xiaoguang et al. | 2020
-
A two-phase sequential pattern mining framework to detect stealthy P2P botnetsDaneshgar, Fateme Faraji / Abbaspour, Maghsoud et al. | 2020
-
Cheating immune k-out-of-n block-based progressive visual cryptographyYang, Ching-Nung / Lin, Yi-Chin / Li, Peng et al. | 2020
-
Privacy-preserving fully anonymous ciphertext policy attribute-based broadcast encryption with constant-size secret keys and fast decryptionMandal, Mriganka et al. | 2020
-
Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage deviceAyub, Muhammad Faizan / Saleem, Muhammad Asad / Altaf, Izwa / Mahmood, Khalid / Kumari, Saru et al. | 2020
-
An examination of susceptibility to spear phishing cyber attacks in non-English speaking communitiesAleroud, Ahmed / Abu-Shanab, Emad / Al-Aiad, Ahmad / Alshboul, Yazan et al. | 2020
-
Lightweight privacy-preserving data aggregation protocol against internal attacks in smart gridWang, Xiao-Di / Meng, Wei-Zhi / Liu, Yi-Ning et al. | 2020
-
Spatiotemporal chaos in multiple dynamically coupled map lattices and its application in a novel image encryption algorithmTao, Ye / Cui, Wenhua / Zhang, Zhao et al. | 2020
-
A certificateless signature for multi-source network codingYu, Huifang / Li, Wen et al. | 2020
-
Tree and elliptic curve based efficient and secure group key agreement protocolRawat, Arjun / Deshmukh, Maroti et al. | 2020
-
eBook surveillance and the threat to freedom of associationWicker, Stephen B. et al. | 2020
-
Design and application of a personal credit information sharing platform based on consortium blockchainZhang, Jing / Tan, Rong / Su, Chunhua / Si, Wen et al. | 2020
-
Editorial Board| 2020
-
Globalized firefly algorithm and chaos for designing substitution boxAlhadawi, Hussam S. / Lambić, Dragan / Zolkipli, Mohamad Fadli / Ahmad, Musheer et al. | 2020
-
Analysis of differential distribution of lightweight block cipher based on parallel processing on GPUChen, Zhanwen / Chen, Jiageng / Meng, Weizhi / Teh, Je Sen / Li, Pei / Ren, Bingqing et al. | 2020
-
Toward supervised shape-based behavioral authentication on smartphonesLi, Wenjuan / Wang, Yu / Li, Jin / Xiang, Yang et al. | 2020
-
Extending STPA with STRIDE to identify cybersecurity loss scenariosde Souza, Nivio Paula / César, Cecília de Azevedo Castro / Bezerra, Juliana de Melo / Hirata, Celso Massaki et al. | 2020
-
Privacy preservation in outsourced mobility traces through compact data structuresCalderoni, Luca / Bandini, Samantha / Maio, Dario et al. | 2020
-
Evaluation metric for crypto-ransomware detection using machine learningKok, S.H. / Azween, A. / Jhanjhi, NZ et al. | 2020
-
A blind quantum audio watermarking based on quantum discrete cosine transformNejad, Mohsen Yoosefi / Mosleh, Mohammad / Heikalabad, Saeed Rasouli et al. | 2020
-
PCHET: An efficient programmable cellular automata based hybrid encryption technique for multi-chat client-server applicationsRoy, Satyabrata / Gupta, Rohit Kumar / Rawat, Umashankar / Dey, Nilanjan / Crespo, Ruben Gonzalez et al. | 2020
-
DART: De-Anonymization of personal gazetteers through social trajectoriesFrancia, Matteo / Gallinucci, Enrico / Golfarelli, Matteo / Santolini, Nicola et al. | 2020
-
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted partyMishra, Dheerendra / Dharminder, Dharminder / Yadav, Preeti / Sreenivasa Rao, Y. / Vijayakumar, Pandi / Kumar, Neeraj et al. | 2020
-
Adaptable feature-selecting and threshold-moving complete autoencoder for DDoS flood attack mitigationKo, Ili / Chambers, Desmond / Barrett, Enda et al. | 2020
-
Rank-metric code-based mutual authentication protocol for RFIDAyebie, Edoukou Berenger / Souidi, El Mamoun et al. | 2020
-
Towards a secure ITS: Overview, challenges and solutionsSleem, Lama / Noura, Hassan N. / Couturier, Raphaël et al. | 2020
-
A survey of authenticated key agreement protocols for multi-server architectureHaq, Inam ul / Wang, Jian / Zhu, Youwen / Maqbool, Saad et al. | 2020
-
Applied graph theory to security: A qualitative placement of security solutions within IoT networksGodquin, Tanguy / Barbier, Morgan / Gaber, Chrystel / Grimault, Jean-Luc / Le Bars, Jean-Marie et al. | 2020
-
Database intrusion detection using role and user behavior based risk assessmentSingh, Indu / Kumar, Narendra / K.G., Srinivasa / Sharma, Tript / Kumar, Vaibhav / Singhal, Siddharth et al. | 2020
-
A bandwidth efficient HMAC-based authentication scheme for network codingLawrence, Tandoh / Ali, Ikram / Christopher, Tandoh / Li, Fagen et al. | 2020
-
Malware classification for the cloud via semi-supervised transfer learningGao, Xianwei / Hu, Changzhen / Shan, Chun / Liu, Baoxu / Niu, Zequn / Xie, Hui et al. | 2020
-
BTCAS: A Blockchain-Based Thoroughly Cross-Domain Authentication SchemeZhang, Hongxia / Chen, Xingshu / Lan, Xiao / Jin, Hongjian / Cao, Qi et al. | 2020
-
Dynamic pricing in industrial internet of things: Blockchain application for energy management in smart citiesKhattak, Hasan Ali / Tehreem, Komal / Almogren, Ahmad / Ameer, Zoobia / Din, Ikram Ud / Adnan, Muhammad et al. | 2020
-
A certificateless ring signature scheme with batch verification for applications in VANETBouakkaz, Samra / Semchedine, Fouzi et al. | 2020
-
Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimizationRtayli, Naoufal / Enneya, Nourddine et al. | 2020
-
Watch out! Doxware on the way…Moussaileb, Routa / Navas, Renzo E. / Cuppens, Nora et al. | 2020
-
A secure blockchain-based e-health records storage and sharing schemeShamshad, Salman / Minahil / Mahmood, Khalid / Kumari, Saru / Chen, Chien-Ming et al. | 2020
-
Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicineMa, Mimi / Fan, Shuqin / Feng, Dengguo et al. | 2020
-
Universal stego post-processing for enhancing image steganographyChen, Bolin / Luo, Weiqi / Zheng, Peijia / Huang, Jiwu et al. | 2020
-
A Deep Learning-based Cryptocurrency Price Prediction Scheme for Financial InstitutionsPatel, Mohil Maheshkumar / Tanwar, Sudeep / Gupta, Rajesh / Kumar, Neeraj et al. | 2020
-
Reversible and recoverable authentication method for demosaiced images using adaptive coding techniqueZhou, Xiaoyu / Hong, Wien / Weng, Shaowei / Chen, Tung-Shou / Chen, Jeanne et al. | 2020
-
Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issuesShamshirband, Shahab / Fathi, Mahdis / Chronopoulos, Anthony T. / Montieri, Antonio / Palumbo, Fabio / Pescapè, Antonio et al. | 2020
-
A data encryption model based on intertwining logistic mapRaghuvanshi, Kamlesh Kumar / Kumar, Subodh / Kumar, Sunil et al. | 2020
-
An exotic multi-dimensional conceptualization for medical image encryption exerting Rossler system and Sine mapSangavi, V. / Thangavel, P. et al. | 2020
-
A Guiding Framework for Vetting the Internet of ThingsMasmoudi, Fatma / Maamar, Zakaria / Sellami, Mohamed / Awad, Ali Ismail / Burégio, Vanilson et al. | 2020
-
Security and privacy of UAV data using blockchain technologyCh, Rupa / Srivastava, Gautam / Reddy Gadekallu, Thippa / Maddikunta, Praveen Kumar Reddy / Bhattacharya, Sweta et al. | 2020