共 40 条
[2]
Ahmadi-Assalemi G., 2020, CYBER DEFENCE AGE SM, P133, DOI [10.1007/978-3-030-35746-7_8, DOI 10.1007/978-3-030-35746-7_8]
[3]
Akash SS, 2022, IEEE Access
[4]
Altun C, 2019, 2019 27 TEL FOR TELF, P1
[5]
Amofa S, 2018, 2018 IEEE 20TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM)
[6]
Blockchain-Based Patient-to-Patient Health Data Sharing
[J].
FRONTIERS IN CYBER SECURITY, FCS 2022,
2022, 1726
:198-210
[7]
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[8]
Hierarchical identity based encryption with constant size ciphertext
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:440-456
[10]
De Maeyer C., 2021, BCS LEARNING DEV, P180, DOI DOI 10.14236/EWIC/HCI2021.18