Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Transactions on Information and System Security, vol.9, issue.1, pp.1-30, 2006. ,
DOI : 10.1145/1127345.1127346
Cloning for privacy protection in multiple independent data publications, Proceedings of the 20th ACM international conference on Information and knowledge management, CIKM '11, p.885, 2011. ,
DOI : 10.1145/2063576.2063705
How to Collect Consent for an Anonymous Medical Database, 2014. ,
Advances in Elliptic Curve Cryptography, 2005. ,
DOI : 10.1017/CBO9780511546570
Public Key Encryption with Keyword Search, Lecture Notes in Computer Science, vol.3027, pp.506-522, 2004. ,
DOI : 10.1007/978-3-540-24676-3_30
CERIAS Tech Report 2005-134 Information Assurance and Security Privacy-Preserving Distributed k -Anonymity, 2005. ,
Tor: The second-generation onion router, Proceedings of the 13th USENIX Security Symposium, 2004. ,
Privacy preserving interoperability for personalized medicine, Swiss Medical Informatics, 2014. ,
Strategies for health data exchange for secondary, cross-institutional clinical research Computer methods and programs in biomedicine, pp.230-251, 2010. ,
Anonymization of Electronic Medical Records to Support Clinical Analysis, Briefs in Electrical and Computer Engineering, 2013. ,
DOI : 10.1007/978-1-4614-5668-1
Publishing data from electronic health records while preserving privacy: A survey of algorithms, Journal of Biomedical Informatics, vol.50, pp.4-19, 2014. ,
DOI : 10.1016/j.jbi.2014.06.002
Therapeutic Drug Monitoring of Imatinib, Clinical Pharmacokinetics, vol.12, issue.22, pp.187-201, 2012. ,
DOI : 10.2165/11596990-000000000-00000
Building web applications on top of encrypted data using Mylar, Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation Pages, pp.157-172, 2014. ,
Secure management of personal health records by applying attribute-based encryption, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health, 2009. ,
DOI : 10.1109/PHEALTH.2009.5754828
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings. Security and Privacy in Communication Networks, pp.89-106, 2010. ,
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption, IEEE Transactions on Parallel and Distributed Systems, vol.24, issue.1, pp.131-143, 2013. ,
DOI : 10.1109/TPDS.2012.97
A secure electronic medical record sharing mechanism in the cloud computing platform, 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE), pp.98-103, 2011. ,
DOI : 10.1109/ISCE.2011.5973792
Multi-centric universal pseudonymisation for secondary use of the EHR, Studies in health technology and informatics, vol.126, pp.239-286, 2007. ,
Secure Medical Architecture on the Cloud Using Wireless Sensor Networks for Emergency Management, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications, pp.248-252, 2013. ,
DOI : 10.1109/BWCCA.2013.142
Multi-key searchable encryption, Cryptology ePrint Archive, vol.508, 2013. ,
Anonymizing Data with Relational and Transaction Attributes, Machine Learning and Knowledge Discovery in Databases Lecture Notes in Computer Science, pp.353-369, 2013. ,
DOI : 10.1007/978-3-642-40994-3_23
Distributed Architecture With Double-Phase Microaggregation for the Private Sharing of Biomedical Data in Mobile Health, IEEE Transactions on Information Forensics and Security, vol.8, issue.6, 2013. ,
DOI : 10.1109/TIFS.2013.2248728
Practical techniques for searches on encrypted data, Proceedings of the 2000 IEEE Symposium on Security and Privacy ,
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, issue.05, pp.557-570, 2002. ,
DOI : 10.1142/S0218488502001648
Secure P2P Cross-Community Health Record Exchange in IHE Compatible Systems, International Journal on Artificial Intelligence Tools, vol.23, issue.01, p.2014 ,
DOI : 10.1142/S0218213014400065
A Decentralized Pseudonym Scheme for Cloud-based eHealth Systems, 2014. ,