参考文献
[1]KUPCHUNAS W R.Personal Health Record[J].Orthopaedic Nursing,2007,26(3):63-71.
[2]LOUR H,SADEGHI A R,WINANDY M.Securing the E-health Cloud[C]//Proceedings of the 1st ACM International Health Informatics Symposium.New York,USA:ACM Press,2010:220-229.
[3]LI M,YU S,CAO N,et al.Authorized Private Keyword Search over Encrypted Data in Ccloud Computing[C]//Proceedings of the 31st International Conference on Distributed Computing Systems.Washington D.C.,USA:IEEE Press,2011:383-392.
[4]LI M,YU S,ZHENG Y,et al.Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-based Encryption[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(1):131-143.
[5]LIU J,HUANG X,LIU J K.Secure Sharing of Personal Health Records in Cloud Computing:Ciphertext-policy Attribute-based Signcryption[J].Future Generation Computer Systems,2014,52:67-76.
[6]师双双.医疗社交网络中隐私保护的基于属性环签密方案[D].西安:西安电子科技大学,2014.
[7]陈桢,张文芳,王小敏.基于属性的抗合谋攻击可变门限环签名方案[J].通信学报,2015,36(12):212-222.
[8]PENG C,WANG W,TIAN Y,et al.An Attribute-based Signcryption Scheme and Its Application in Information Hiding[J].Chinese Journal of Electronics,2016,25(4):632-640.
[9]XIONG H,GENG J,QIN Z,et al.Cryptanalysis of Attribute-based Ring Signcryption Scheme[J].International Journal of Network Security,2015,17(2):224-228.
[10]HU C,CHENG X,TIAN Z,et al.An Attribute-based Signcryption Scheme to Secure Attribute-defined Multicast Communications[M].Berlin,Germany:Springer,2015.
[11]GUO Z,LI M,FAN X.Attribute-based Ring Signcryption Scheme[J].Security & Communication Networks,2013,6(6):790-796.
[12]HAN Y.Generalization of Signcryption for Resources Constrained Environments[J].Wireless Communications & Mobile Computing,2007,7(7):919-931.
[13]SAHAI A,WATERS B.Fuzzy Identity-based Encry-ption[J].Lecture Notes in Computer Science,2005,3494:457-473.
[14]陈少真,王文强,彭书娟.高效的基于属性的环签名方案[J].计算机研究与发展,2010,47(12):2075-2082.
[15]JOTHI A A,SRINIVASAN B.Security Analysis in Body Area Networks Using Attribute-based Ring Signcryption Scheme[J].Research Journal of Applied Sciences Engineering & Technology,2016,13(1):48-56.
[16]HU C,ZHANG N,LI H,et al.Body Area Network Security:A Fuzzy Attribute-based Signcryption Scheme[J].IEEE Journal on Selected Areas in Communications,2013,31(9):37-46.
编辑索书志 |