際際滷

際際滷Share a Scribd company logo
BIBLIOGRAPHY
[1] P. Mohan, D. Marin, S. Sultan, and A. Deen, Medinet: personalizing the self-care
process for patients with diabetes and cardiovascular disease using mobile
telephony. Conference Proceedings of the International Conference of IEEE
Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755758.
[Online]. Available: http://www.ncbi.nlm.nih.gov/pubmed/19162765
[2] A. Tsanas, M. Little, P. McSharry, and L. Ramig, Accurate telemonitoring of
parkinsons disease progression by noninvasive speech tests, Biomedical
Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884  893, 2010.
[3] G. Clifford and D. Clifton, Wireless technology in disease management and
medicine, Annual Review of Medicine, vol. 63, pp. 479492, 2012.
[4] L. Ponemon Institute, Americans opinions on healthcare privacy, available:
http://tinyurl.com/4atsdlj, 2010.
[5] A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. vanBeijnum, and P. D. Stefanis, End-
user perception towards pervasive cardiac healthcare services: Benefits, acceptance,
adoption, risks, security, privacy and trust, in PervasiveHealth, 2011, pp. 478484.
[6] M. Delgado, The evolution of health care it: Are current u.s. privacy policies ready
for the clouds? in SERVICES, 2011, pp. 371378.
[7] N. Singer, When 2+ 2 equals a privacy question, New York Times, 2009.
[8] E. B. Fernandez, Security in data intensive computing systems, in Handbook of
Data Intensive Computing, 2011, pp. 447466.
[9] A. Narayanan and V. Shmatikov, Myths and fallacies of personally identifiable
information, Communications of the ACM, vol. 53, no. 6 , pp. 2426, 2010.
[10] P. Baldi, R. Baronio, E. D. Cristofaro, P. Gasti, and G. Tsudik, Countering gattaca:
efficient and secure testing of fully-sequenced human genomes, in ACM
Conference on Computer and Communications Security, 2011, pp. 691702.
APPENDIX
1) Indistinguishability of Encryptions under Chosen Ciphertext Attack:
The ID-IE-CCA security for the proposed key private proxy re-encryption scheme
is defined by the following chosen-cipher text attack game played between a challenger C
and an adversary A. Note that we have two types of cipher texts in the proposed key
private re-encryption scheme, and hence, there are two situations.
2) Indistinguishability of Keys under Chosen-Ciphertext Attack:
The ID-IK-CCA security for our proposed key private re-encryption scheme is
defined by the same method as for the ID-IE-CCA security. Note that we have two types
of challenges. One is for an original ciphertext, the other is for a re-encryption key. The
former is for the anonymity of the original ciphertext, and the latter is for the anonymity
of the re-encryption key.

More Related Content

A PROJECT REPORT ON CLOUD ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING

  • 1. BIBLIOGRAPHY [1] P. Mohan, D. Marin, S. Sultan, and A. Deen, Medinet: personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony. Conference Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755758. [Online]. Available: http://www.ncbi.nlm.nih.gov/pubmed/19162765 [2] A. Tsanas, M. Little, P. McSharry, and L. Ramig, Accurate telemonitoring of parkinsons disease progression by noninvasive speech tests, Biomedical Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884 893, 2010. [3] G. Clifford and D. Clifton, Wireless technology in disease management and medicine, Annual Review of Medicine, vol. 63, pp. 479492, 2012. [4] L. Ponemon Institute, Americans opinions on healthcare privacy, available: http://tinyurl.com/4atsdlj, 2010. [5] A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. vanBeijnum, and P. D. Stefanis, End- user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust, in PervasiveHealth, 2011, pp. 478484. [6] M. Delgado, The evolution of health care it: Are current u.s. privacy policies ready for the clouds? in SERVICES, 2011, pp. 371378. [7] N. Singer, When 2+ 2 equals a privacy question, New York Times, 2009. [8] E. B. Fernandez, Security in data intensive computing systems, in Handbook of Data Intensive Computing, 2011, pp. 447466. [9] A. Narayanan and V. Shmatikov, Myths and fallacies of personally identifiable information, Communications of the ACM, vol. 53, no. 6 , pp. 2426, 2010. [10] P. Baldi, R. Baronio, E. D. Cristofaro, P. Gasti, and G. Tsudik, Countering gattaca: efficient and secure testing of fully-sequenced human genomes, in ACM Conference on Computer and Communications Security, 2011, pp. 691702.
  • 2. APPENDIX 1) Indistinguishability of Encryptions under Chosen Ciphertext Attack: The ID-IE-CCA security for the proposed key private proxy re-encryption scheme is defined by the following chosen-cipher text attack game played between a challenger C and an adversary A. Note that we have two types of cipher texts in the proposed key private re-encryption scheme, and hence, there are two situations. 2) Indistinguishability of Keys under Chosen-Ciphertext Attack: The ID-IK-CCA security for our proposed key private re-encryption scheme is defined by the same method as for the ID-IE-CCA security. Note that we have two types of challenges. One is for an original ciphertext, the other is for a re-encryption key. The former is for the anonymity of the original ciphertext, and the latter is for the anonymity of the re-encryption key.