January 2009
·
11 Reads
·
21 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
... In this scheme, the patient can generate and store the cryptographic key; so that patients' privacy in the computer data center is not compromised. In the same year, Xue et al. proposed an authentication system using identity -based encryption to protect the confidentiality of electronic health networks [15]. ...
January 2009