1 |
A. Dubovitskaya, Z. Xu, S. Ryu, M. Schumacher, and F. Wang, "Secure and trustable electronic medical records sharing using blockchain," in AMIA Annual Symposium Proceedings, Washington, DC, 2017, pp. 650-659.
|
2 |
Y. Fahim, H. Rahhali, M. Hanine, E. H. Benlahmar, E. H. Labriji, M. Hanoune, and A. Eddaoui, "Load balancing in cloud computing using meta-heuristic algorithm," Journal of Information Processing Systems, vol. 14, no. 3, pp. 569-589, 2018.
DOI
|
3 |
Y. S. Jeong and J. H. Park, "Novel solutions and approaches to effective data processing," Journal of Information Processing Systems, vol. 14, no. 3, pp. 563-568, 2018.
DOI
|
4 |
E. Gaetani, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, and V. Sassone, "Blockchain-based database to ensure data integrity in cloud computing environments," in Proceedings of the Italian Conference on Cybersecurity, Venice, Italy, 2017.
|
5 |
P. Ora and P. R. Pal, "Data security and integrity in cloud computing based on RSA partial homomorphic and MD5 cryptography," in 2015 International Conference on Computer, Communication and Control (IC4), Indore, India, 2015, pp. 1-6.
|
6 |
M. Mettler, "Blockchain technology in healthcare: the revolution starts here," in Proceedings of 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), Munich, Germany, 2016, pp. 1-3.
|
7 |
D. Pandey, B. H. Kim, H. S. Gang, G. R. Kwon, and J. Y. Pyun, "Maximizing network utilization in IEEE 802.21 assisted vertical handover over wireless heterogeneous networks," Journal of Information Processing Systems, vol. 14, no. 3, pp. 771-789, 2018.
DOI
|
8 |
X. Yue, H. Wang, D. Jin, M. Li, and W. Jiang, "Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control," Journal of Medical Systems, vol. 40, article no. 218, 2016.
|
9 |
Y. Zhu, H. Hu, G. J. Ahn, and M. Yu, "Cooperative provable data possession for integrity verification in multicloud storage," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231-2244, 2012.
DOI
|
10 |
R. J. Krawiec, D. Housman, M. White, M. Filipova, F. Quarre, D. Barr, et al., "Blockchain: opportunities for health care," Deloitte Development LLC, 2016.
|
11 |
A. Ekblaw, A. Azaria, J. D. Halamka, and A. Lippman, "A case study for Blockchain in healthcare: "MedRec" prototype for electronic health records and medical research data," in Proceedings of the 2nd International Conference on Open & Big Data, Vienna, Austria, 2016.
|
12 |
T. T. Kuo, H. E. Kim, and L. Ohno-Machado, "Blockchain distributed ledger technologies for biomedical and health care applications," Journal of the American Medical Informatics Association, vol. 24, no. 6, pp. 1211-1220, 2017.
DOI
|
13 |
A. Dubovitskaya, Z. Xu, S. Ryu, M. Schumacher, and F. Wang, "Secure and trustable electronic medical records sharing using blockchain," AMIA Annual Symposium Proceedings, vol. 2017, pp. 650-659, 2017.
|
14 |
C. Sasikala and C. S. Bindu, "A study on remote data integrity checking techniques in cloud," in Proceedings of 2017 International Conference on Public Key Infrastructure and its Applications (PKIA), Bangalore, India, 2017, pp. 43-48.
|
15 |
W. Liu, S. S. Zhu, T. Mundie, and U. Krieger, "Advanced block-chain architecture for e-health systems," in Proceedings of 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom), Dalian, China, 2017, pp. 1-6.
|
16 |
I. Zikratov, A. Kuzmin, V. Akimenko, V. Niculichev, and L. Yalansky, "Ensuring data integrity using blockchain technology," in Proceedings of 2017 20th Conference of Open Innovations Association (FRUCT), St. Petersburg, Russia, 2017, pp. 534-539.
|
17 |
E. Andreeva, B. Mennink, and B. Preneel, "Security properties of domain extenders for cryptographic hash functions," Journal of Information Processing Systems, vol. 6, no. 4, pp. 453-480, 2010.
DOI
|
18 |
P. Zhang, M. A. Walker, J. White, D. C. Schmidt, and G. Lenz, "Metrics for assessing blockchain-based healthcare decentralized apps," in Proceedings of 2017 IEEE 19th International Conference on e-Health Networking, Applications and Services (Healthcom), Dalian, China, 2017, pp. 1-4.
|
19 |
A. Buldas, A. Kroonmaa, and R. Laanoja, "Keyless signatures' infrastructure: how to build global distributed hash-trees," in Nordic Conference on Secure IT Systems. Heidelberg: Springer, 2013, pp. 313-320.
|