1 |
Humer, Caroline, and Jim Finkle. "Your medical record is worth more to hackers than your credit card." Reuters.com US Edition 24 (2014).
|
2 |
Monero, "How does monero's privacy work?" https://www.monero.how/how-does-monero-privacy-work (2018.11.11.접속)
|
3 |
Liang, Kaitai, et al. "A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security." Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on. IEEE, 2013.
|
4 |
Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." (2008).
|
5 |
Mambo, Masahiro, and Eiji Okamoto. "Proxy cryptosystems: Delegation of the power to decrypt ciphertexts." IEICE transactions on fundamentals of electronics, Communications and computer sciences 80.1 (1997): 54-63.
|
6 |
Liang, Xiaohui, et al. "Attribute based proxy re-encryption with delegating capabilities." Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. ACM, 2009.
|
7 |
Luo, Song, Jianbin Hu, and Zhong Chen. "Ciphertext policy attribute-based proxy re-encryption." International Conference on Information and Communications Security. Springer, Berlin, Heidelberg, 2010.
|
8 |
Azaria, Asaph, et al. "Medrec: Using blockchain for medical data access and permission management." Open and Big Data (OBD), International Conference on. IEEE, 2016.
|
9 |
Conti, Mauro, et al. "A survey on security and privacy issues of bitcoin." IEEE Communications Surveys & Tutorials (2018).
|
10 |
MedicalChain, "whitepaper v2.0," https://medicalchain.com/en/ (2018.11.11.접속)
|
11 |
MedicalBlock, "whitepaper v1.0," https://medicalchain.com/ko/ (2018.11.11.접속)
|