Author:
Chenam Venkata Bhikshapathi,Sree Kondepati Dhana,Ali Syed Taqi
Publisher
Springer Science and Business Media LLC
Reference35 articles.
1. Jin Z, Chen Y (2015) Telemedicine in the cloud era: Prospects and challenges. IEEE Pervasive Comput 14(1):54–61
2. Tang S, Li X, Huang X, Xiang Y, Xu L (2015) Achieving simple, secure and efficient hierarchical access control in cloud computing. IEEE Trans Comput 65(7):2325–2331
3. Abbas A, Khan SU (2014) A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J Biomed Health Inform 18(4):1431–1441
4. Tang S, Xu L, Liu N, Huang X, Ding J, Yang Z (2014) Provably secure group key management approach based upon hyper-sphere. IEEE Trans Parallel Distrib Syst 25(12):3253–3263
5. Song DX, Wagner D, Perrig A (2000) Practical techniques for searches on encrypted data. In: Proceeding 2000 IEEE symposium on security and privacy. S &P 2000, pp 44–55. IEEE