Fundamentals of queueing theory (2nd ed.).
Fundamentals of queueing theory (2nd ed.).
Networks without user observability
Computers and Security
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Trajectory based forwarding and its applications
Proceedings of the 9th annual international conference on Mobile computing and networking
Flooding strategy for target discovery in wireless networks
MSWIM '03 Proceedings of the 6th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems
Parametric probabilistic sensor network routing
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Pervasive Body Sensor Network: An Approach to Monitoring the Post-operative Surgical Patient
BSN '06 Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks
Sensory baby vest for the monitoring of infants
BSN '06 Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks
A new solution for a Heart Failure Monitoring system based on Wearable and Information Technologies
BSN '06 Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks
Entrapping Adversaries for Source Protection in Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Pervasive healthcare and wireless health monitoring
Mobile Networks and Applications
Security and Privacy for Implantable Medical Devices
IEEE Pervasive Computing
Efficient remote user authentication scheme using smart card
Computer Networks: The International Journal of Computer and Telecommunications Networking
Message splitting against the partial adversary
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
A Mobile Care System With Alert Mechanism
IEEE Transactions on Information Technology in Biomedicine
Security and privacy in RFID and applications in telemedicine
IEEE Communications Magazine
Flooding in wireless ad hoc networks
Computer Communications
Real-time mixes: a bandwidth-efficient anonymity protocol
IEEE Journal on Selected Areas in Communications
Utility-based asynchronous flow control algorithm for wireless sensor networks
IEEE Journal on Selected Areas in Communications - Special issue on simple wireless sensor networking solutions
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing
International Journal of Security and Networks
Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network
Proceedings of the Fifth International Conference on Body Area Networks
Mobile device aided cooperative transmission for body area networks
Proceedings of the Fifth International Conference on Body Area Networks
A secure handshake scheme with symptoms-matching for mHealthcare social network
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
Energy-efficient and reliability-driven cooperative communications in cognitive body area networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
CRYPE: towards cryptographically enforced and privacy enhanced WBANs
Proceedings of the First International Conference on Security of Internet of Things
BDK: secure and efficient biometric based deterministic key agreement in wireless body area networks
BodyNets '13 Proceedings of the 8th International Conference on Body Area Networks
A sensitive data aggregation scheme for body sensor networks based on data hiding
Personal and Ubiquitous Computing
An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps
Journal of Medical Systems
Hi-index | 0.00 |
The eHealth system is envisioned as a promising approach to improving health care through information technology, where security and privacy are crucial for its success and large-scale deployment. In this paper, we propose a strong privacy-preserving Scheme Against Global Eavesdropping, named SAGE, for eHealth systems. The proposed SAGE can achieve not only the content oriented privacy but also the contextual privacy against a strong global adversary. Extensive analysis demonstrates the effectiveness and practicability of the proposed scheme.