Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Seung Geol Choi"'
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-14 (2024)
Abstract E-health has become a top priority for healthcare organizations focused on advancing healthcare services. Thus, medical organizations have been widely adopting cloud services, resulting in the effective storage of sensitive data. To prevent
Externí odkaz:
https://doaj.org/article/72bd66e268824b329753625cd747c4ea
Publikováno v:
International Journal of Information Management Data Insights, Vol 4, Iss 1, Pp 100211- (2024)
With the continuous growth of cloud-based Electronic Health Record (EHR) systems and medical data, medical organizations are particularly concerned about storing patient data to provide fast services while adhering to privacy and security concerns. E
Externí odkaz:
https://doaj.org/article/e5ba75bd5e9144b0ab9a5beafa25159f
Publikováno v:
2023 IEEE 9th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS).
Publikováno v:
Theory of Cryptography ISBN: 9783031223648
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3a7550c16ba37994934258a5bd3bd123
https://doi.org/10.1007/978-3-031-22365-5_13
https://doi.org/10.1007/978-3-031-22365-5_13
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 3, Pp 153-174 (2020)
We consider a scenario where multiple organizations holding large amounts of sensitive data from their users wish to compute aggregate statistics on this data while protecting the privacy of individual users. To support large-scale analytics we inves
Publikováno v:
ICDH
To ensure a secure Cloud-based Electronic Health Record (EHR) system, we need to encrypt data and impose field-level access control to prevent malicious usage. Since the attributes of the Users will change with time, the encryption policies adopted m
Publikováno v:
IEEE BigData
Cloud-based electronic health records (EHR) systems provide important security controls by encrypting patient data. However, these records cannot be queried without decrypting the entire record. This incurs a huge amount of burden in network bandwidt
Publikováno v:
Journal of Cryptology. 32:459-497
We continue the line of work initiated by Katz (Eurocrypt 2007) on using tamper-proof hardware tokens for universally composable secure computation. As our main result, we show an oblivious-transfer (OT) protocol in which two parties each create and
Publikováno v:
Designs, Codes and Cryptography. 86:641-663
We give a new black-box transformation from any semantically secure encryption scheme into a non-malleable one which has a better rate than the best previous work of Coretti et al. (in: Kushilevitz and Malkin (eds) TCC 2016-A, Part I, Springer, Heide
Publikováno v:
Journal of Cryptology. 31:172-201
We show how to transform any semantically secure encryption scheme into a non-malleable one, with a black-box construction that achieves a quasi-linear blow-up in the size of the ciphertext. This improves upon the previous non-black-box construction