Healthchain: A novel framework on privacy preservation of electronic health records using blockchain technology

S Chenthara, K Ahmed, H Wang, F Whittaker, Z Chen - Plos one, 2020 - journals.plos.org
The privacy of Electronic Health Records (EHRs) is facing a major hurdle with outsourcing
private health data in the cloud as there exists danger of leaking health information to …

[图书][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

Certificateless public key cryptography

SS Al-Riyami, KG Paterson - International conference on the theory and …, 2003 - Springer
This paper introduces and makes concrete the concept of certificateless public key
cryptography (CL-PKC), a model for the use of public key cryptography which avoids the …

Linking sensitive data

P Christen, T Ranbaduge, R Schnell - Methods and techniques for …, 2020 - Springer
Sensitive personal data are created in many application domains, and there is now an
increasing demand to share, integrate, and link such data within and across organisations in …

A comprehensive review of the security flaws of hashing algorithms

A Sadeghi-Nasab, V Rafe - Journal of Computer Virology and Hacking …, 2023 - Springer
The blockchain is an emerging technology. It is widely used because of its efficiency and
functionality. The hash function, as a supporting aspect of the data structure, is critical for …

[HTML][HTML] Realizing quantum-safe information sharing: Implementation and adoption challenges and policy recommendations for quantum-safe transitions

I Kong, M Janssen, N Bharosa - Government Information Quarterly, 2024 - Elsevier
By utilizing the properties of quantum mechanics, quantum computers have the potential to
factor a key pair of a large prime number and break some of the core cryptographic …

The PERMIS X. 509 role based privilege management infrastructure

DW Chadwick, A Otenko - Proceedings of the seventh ACM symposium …, 2002 - dl.acm.org
This paper describes the output of the PERMIS project, which has developed a role based
access control infrastructure that uses X. 509 attribute certificates (ACs) to store the users' …

Cecoin: A decentralized PKI mitigating MitM attacks

B Qin, J Huang, Q Wang, X Luo, B Liang… - Future Generation …, 2020 - Elsevier
For numerous applications, it is essential to reliably link a public key with its owner. The
current solution is to employ the well-known Public Key Infrastructure (PKI), represented by a …

Securing blockchain-based IoT systems: A review

D Commey, B Mai, SG Hounsinou, GV Crosby - IEEE Access, 2024 - ieeexplore.ieee.org
This paper reviews the role of blockchain technology in enhancing the security of Internet of
Things (IoT) systems and maintaining data integrity. We address the increased …

[PDF][PDF] Sans institute infosec reading room

RF Rights - Risk, 2001 - picture.iczhiku.com
As Technology pushes the limits of removable media-so drives the need for a new file
system in order to support the larger capacities and faster access speeds being designed …