[1]
Rash, M.C. Privacy concerns hinder electronic medical records. The Business Journal of the Greater Triad Area (Apr. 4, 2005).
Google Scholar
[2]
Lin X, Lu R, Shen X, Nemoto Y, Kato N. SAGE: a strong privacy preserving scheme against global eavesdropping for ehealth systems. IEEE Journal of Selected Areas of Communications.
DOI: 10.1109/jsac.2009.090502
Google Scholar
[3]
Ou, C. -M. and Ou, C. R., A High-Level 3G Wireless PKI Solution for Secure Healthcare Communications, EuroPKI 2006, Lecture Notes in Computer Science 4043, Springer-Verlag, 2006, pp.254-256.
DOI: 10.1007/11774716_22
Google Scholar
[4]
Yuhai Zhang, Yongyong Xu, Lei Shang, etc. An investigation into health informatics and related standards in China. International Journal of Medical Informatics[J]. 2007(76), 614–620.
DOI: 10.1016/j.ijmedinf.2006.05.003
Google Scholar
[5]
M. Layouni, K. Verslype, M. T. Sandikkaya. Privacy-Preserving Telemonitoring for eHealth. Data and Applications Security 2009, LNCS 5645, p.95–110, (2009).
DOI: 10.1007/978-3-642-03007-9_7
Google Scholar
[6]
Md. Mokammel Haque, Al-Sakib Khan Pathan, and Choong Seon Hong, Securing U-Healthcare Sensor Networks using Public Key Based Scheme, ICACT 2008:17-20.
DOI: 10.1109/icact.2008.4493960
Google Scholar
[7]
U. Sax, I. Kohane, and K.D. Mandl, Wireless Technology Infrastructures for Authentication of Patients: PKI That Rings, J. Am. Medical Informatics Assoc., vol. 12, no. 3, pp.263-268, (2005).
DOI: 10.1197/jamia.m1681
Google Scholar
[8]
D. Boneh and M. Franklin, Identity-based encryption from the weil pairings. Advances in Cryptology-Asiacrypt Springer-Verlag, 2001. LNCS 2248, pp.514-532.
Google Scholar
[9]
J. Cha and J. Cheon, An identity-based signature from gap diffie-hellman groups. in Prof. Practice and Theory in Public Key Cryptography– PKC'2003, Springer-Verlag, 2003. LNCS 21392567 pp.18-30.
DOI: 10.1007/3-540-36288-6_2
Google Scholar