This document provides a bibliography of 10 sources related to mobile health, telemonitoring, wireless technology in disease management, privacy concerns, and genetic testing. It also includes two appendices that define security properties - indistinguishability of encryptions under chosen ciphertext attack and indistinguishability of keys under chosen ciphertext attack - for a proposed key private proxy re-encryption scheme.