Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Privacy-Preserving Cooperative Statistical Analysis
ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference
Wireless Body Sensor Network Using Medical Implant Band
Journal of Medical Systems
A new efficient privacy-preserving scalar product protocol
AusDM '07 Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70
SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
Enabling secure service discovery in mobile healthcare enterprise networks
IEEE Wireless Communications - Special issue title on applications and support technical for mobility and enterprise services
Fast track article: Bubble-sensing: Binding sensing tasks to the physical world
Pervasive and Mobile Computing
Cross-Domain Data Sharing in Distributed Electronic Health Record Systems
IEEE Transactions on Parallel and Distributed Systems
Data security and privacy in wireless body area networks
IEEE Wireless Communications
Monitoring patients via a secure and mobile healthcare system
IEEE Wireless Communications
From opportunistic networks to opportunistic computing
IEEE Communications Magazine
Performance evaluation of service execution in opportunistic computing
Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems
Improving the efficiency of anonymous routing for MANETs
Computer Communications
Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network
Proceedings of the Fifth International Conference on Body Area Networks
A secure handshake scheme with symptoms-matching for mHealthcare social network
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
IEEE Transactions on Parallel and Distributed Systems
IEEE Transactions on Parallel and Distributed Systems
Toward a secure batch verification with group testing for VANET
Wireless Networks
Hi-index | 0.00 |
Mobile Healthcare (m-Healthcare) systems, namely smartphone applications of pervasive computing that utilize wireless body sensor networks (BSNs), have recently been proposed to provide smartphone users with health monitoring services and received great attentions. An m-Healthcare system with flaws, however, may leak out the smartphone user's personal information and cause security, privacy preservation, or user anonymity problems. In 2012, Lu et al. proposed a secure and privacy-preserving opportunistic computing (SPOC) framework for mobile-Healthcare emergency. The brilliant SPOC framework can opportunistically gather resources on the smartphone such as computing power and energy to process the computing-intensive personal health information (PHI) in case of an m-Healthcare emergency with minimal privacy disclosure. To balance between the hazard of PHI privacy disclosure and the necessity of PHI processing and transmission in m-Healthcare emergency, in their SPOC framework, Lu et al. introduced an efficient user-centric privacy access control system which they built on the basis of an attribute-based access control mechanism and a new privacy-preserving scalar product computation (PPSPC) technique. However, we found out that Lu et al.'s protocol still has some secure flaws such as user anonymity and mutual authentication. To fix those problems and further enhance the computation efficiency of Lu et al.'s protocol, in this article, the authors will present an improved mobile-Healthcare emergency system based on extended chaotic maps. The new system is capable of not only providing flawless user anonymity and mutual authentication but also reducing the computation cost.