ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Blockchain‐based IoT architecture to secure healthcare system using identity‐based encryption
Expert Systems
◽
10.1111/exsy.12915
◽
2021
◽
Author(s):
Pratima Sharma
◽
Nageswara Rao Moparthi
◽
Suyel Namasudra
◽
Vimal Shanmuganathan
◽
Ching‐Hsien Hsu
Keyword(s):
Healthcare System
◽
Identity Based Encryption
◽
Identity Based
Download Full-text
Related Documents
Cited By
References
A secure data sharing using identity-based encryption scheme for e-healthcare system
2017 3rd International Conference on Science in Information Technology (ICSITech)
◽
10.1109/icsitech.2017.8257151
◽
2017
◽
Cited By ~ 3
Author(s):
Amang Sudarsono
◽
Mike Yuliana
◽
Haryadi Amran Darwito
Keyword(s):
Data Sharing
◽
Healthcare System
◽
Encryption Scheme
◽
Identity Based Encryption
◽
Secure Data
◽
Identity Based
Download Full-text
Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE)
Smart Innovation, Systems and Technologies - Smart Trends in Computing and Communications
◽
10.1007/978-981-15-0077-0_21
◽
2019
◽
pp. 199-209
Author(s):
Dipa D. Dharamadhikari
◽
Sharvari C. Tamane
Keyword(s):
Healthcare System
◽
Identity Based Encryption
◽
Identity Based
◽
Ciphertext Policy
Download Full-text
Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences
◽
10.1587/transfun.e94.a.45
◽
2011
◽
Vol E94-A
(1)
◽
pp. 45-56
◽
Cited By ~ 6
Author(s):
Jae Hong SEO
◽
Tetsutaro KOBAYASHI
◽
Miyako OHKUBO
◽
Koutarou SUZUKI
Keyword(s):
Identity Based Encryption
◽
Identity Based
Download Full-text
Jhanwar-Barua’s Identity-Based Encryption Revisited
Network and System Security - Lecture Notes in Computer Science
◽
10.1007/978-3-319-11698-3_21
◽
2014
◽
pp. 271-284
◽
Cited By ~ 5
Author(s):
Ibrahim Elashry
◽
Yi Mu
◽
Willy Susilo
Keyword(s):
Identity Based Encryption
◽
Identity Based
Download Full-text
Blind Identity-Based Encryption and Simulatable Oblivious Transfer
Advances in Cryptology – ASIACRYPT 2007 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-76900-2_16
◽
2007
◽
pp. 265-282
◽
Cited By ~ 70
Author(s):
Matthew Green
◽
Susan Hohenberger
Keyword(s):
Oblivious Transfer
◽
Identity Based Encryption
◽
Identity Based
Download Full-text
An Authentication Scheme Using Identity-based Encryption & Blockchain
2018 IEEE Symposium on Computers and Communications (ISCC)
◽
10.1109/iscc.2018.8538446
◽
2018
◽
Cited By ~ 5
Author(s):
Beini Zhou
◽
Hui Li
◽
Li Xu
Keyword(s):
Authentication Scheme
◽
Identity Based Encryption
◽
Identity Based
Download Full-text
Identity-based encryption with outsourced equality test in cloud computing
Information Sciences
◽
10.1016/j.ins.2015.08.053
◽
2016
◽
Vol 328
◽
pp. 389-402
◽
Cited By ~ 57
Author(s):
Sha Ma
Keyword(s):
Cloud Computing
◽
Identity Based Encryption
◽
Identity Based
◽
Equality Test
Download Full-text
Practical identity-based encryption in multiple private key generator (PKG) environments
Security and Communication Networks
◽
10.1002/sec.743
◽
2013
◽
Vol 8
(1)
◽
pp. 43-50
◽
Cited By ~ 1
Author(s):
Shengbao Wang
◽
Zhenfu Cao
◽
Qi Xie
◽
Wenhao Liu
Keyword(s):
Practical Identity
◽
Private Key
◽
Identity Based Encryption
◽
Identity Based
Download Full-text
A Survey on Identity-Based Encryption from Lattices
Mathematical Modelling for Next-Generation Cryptography - Mathematics for Industry
◽
10.1007/978-981-10-5065-7_19
◽
2017
◽
pp. 349-365
◽
Cited By ~ 1
Author(s):
Goichiro Hanaoka
◽
Shota Yamada
Keyword(s):
Identity Based Encryption
◽
Identity Based
Download Full-text
Compact identity-based encryption without strong symmetric cipher
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11
◽
10.1145/1966913.1966923
◽
2011
◽
Cited By ~ 2
Author(s):
Joonsang Baek
◽
Jianying Zhou
Keyword(s):
Identity Based Encryption
◽
Identity Based
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close