Author of the publication

Confidentiality Protection of Digital Health Records in Cloud Computing.

, , , , , , and . J. Medical Syst., 40 (5): 124:1-124:12 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure user authentication scheme for wireless healthcare sensor networks., and . Comput. Electr. Eng., (2017)A reliable authentication scheme of personal health records in cloud computing., , , and . Wirel. Networks, 30 (5): 3759-3769 (July 2024)Design and Implementation a Smart Pillbox., , , , and . 6GN, volume 337 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 427-432. Springer, (2020)An Intelligent Based Symmetrical Classification of Online Shop Selling Counterfeit Products., , , and . Symmetry, 14 (10): 2132 (2022)Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent., , , and . AINA Workshops, page 650-655. IEEE Computer Society, (2008)An improved and efficient coercion-resistant measure for electronic voting system., , , , and . Int. J. Inf. Sec., 23 (4): 2637-2654 (August 2024)Efficient migration for mobile computing in distributed networks., , , , and . Comput. Stand. Interfaces, 31 (1): 40-47 (2009)Confidentiality Protection of Digital Health Records in Cloud Computing., , , , , , and . J. Medical Syst., 40 (5): 124:1-124:12 (2016)Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent., , , and . MUE, page 189-196. IEEE Computer Society, (2009)Threshold Signature Scheme Resistible for Conspiracy Attack., , , and . PDCAT, page 479-483. IEEE Computer Society, (2006)