{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:51:54Z","timestamp":1726037514366},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_4","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"35-46","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Telemedical Monitoring System Based on Homomorphic Encryption"],"prefix":"10.1007","author":[{"given":"Fei","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Shaofeng","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Fengchen","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Xiaopeng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"1A","key":"4_CR1","first-page":"5","volume":"35","author":"J Li","year":"2014","unstructured":"Li, J., Gu, J.: Challenges and opportunities of medicine in the age of big data and personalized medicine. Med. Philos. 35(1A), 5\u201310 (2014)","journal-title":"Med. Philos."},{"key":"4_CR2","first-page":"44","volume":"2","author":"F Xue","year":"2015","unstructured":"Xue, F., Chen, H.-B.: Analysis of privacy ethics of big data. Stud. Dialectics Nat. 2, 44\u201348 (2015)","journal-title":"Stud. Dialectics Nat."},{"unstructured":"Schwab, K: The Fourth Industrial Revolution. \n                      http:\/\/www.foreignaffairs.com\/articles\/2015-12-12\/fourth-industrial-revolution\n                      \n                    . Accessed 26 Mar 2016","key":"4_CR3"},{"issue":"5A","key":"4_CR4","first-page":"5","volume":"37","author":"Q-F Wang","year":"2016","unstructured":"Wang, Q.-F.: Rational thinking on hierarchical control of medical privacy in the era of big data. Med. Philos. (A) 37(5A), 5\u20138 (2016)","journal-title":"Med. Philos. (A)"},{"key":"4_CR5","volume-title":"On Data Banks and Privacy Homorphisms. Foundations of Secure Computation","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Adleman, L., Dertouzos, M.: On Data Banks and Privacy Homorphisms. Foundations of Secure Computation. Academic Press, New York (1978)"},{"doi-asserted-by":"crossref","unstructured":"Cohen, J., Fischer, M.: A robust and verifiable cryptographically secure election scheme. In: Proceedings of the 26th Annual Symposium on Foundation of Computer Science, pp. 372\u2013382. IEEE, Piscataway (1985)","key":"4_CR6","DOI":"10.1109\/SFCS.1985.2"},{"issue":"6","key":"4_CR7","first-page":"1378","volume":"52","author":"S Li","year":"2015","unstructured":"Li, S., Dou, J., Wang, D.: Survey on homomorphic encryption and its applications to cloud security. J. Comput. Res. Dev. 52(6), 1378\u20131388 (2015)","journal-title":"J. Comput. Res. Dev."},{"issue":"7","key":"4_CR8","first-page":"1830","volume":"29","author":"Z-Y Li","year":"2018","unstructured":"Li, Z.-Y., Gui, X.-L., Gu, Y.-J., LI, X.-S., Dai, H.-J., Zhang, X.-J.: Survey on homomorphic encryption algorithm and its application in the privacy-preserving for cloud computing. J. Softw. 29(7), 1830\u20131851 (2018)","journal-title":"J. Softw."},{"issue":"11","key":"4_CR9","first-page":"18","volume":"34","author":"C-H Peng","year":"2013","unstructured":"Peng, C.-H., Tian, Y.-L., Zhang, B., Xu, Z.-P.: General transitive signature scheme based on homomorphic encryption. J. Commun. 34(11), 18\u201325 (2013)","journal-title":"J. Commun."},{"issue":"1","key":"4_CR10","first-page":"26","volume":"22","author":"L Gong","year":"2016","unstructured":"Gong, L., Li, S., Guo, Y.: the development and applications of homomorphic encryption. ZTE Technol. J. 22(1), 26\u201329 (2016)","journal-title":"ZTE Technol. J."},{"issue":"1","key":"4_CR11","first-page":"001","volume":"55","author":"R Meng","year":"2018","unstructured":"Meng, R., Rice, S.G., Wang, J., Sun, X.: A fusion steganographic algorithm based on faster R-CNN. CMC: Comput. Mater. Continua 55(1), 001\u2013016 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"issue":"1","key":"4_CR12","first-page":"037","volume":"55","author":"Y Liu","year":"2018","unstructured":"Liu, Y., Peng, H., Wang, J.: Verifiable diversity ranking search over encrypted outsourced data. CMC Comput. Mater. Continua 55(1), 037\u2013057 (2018)","journal-title":"CMC Comput. Mater. Continua"},{"doi-asserted-by":"crossref","unstructured":"Brakersk, Z., Vaikuntanathan, V., Wee, H., Wichs, D.: Obfuscating conjunctions under entropic ring LWE. In: Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, Massachusetts, USA, pp. 14\u201317 (2016)","key":"4_CR13","DOI":"10.1145\/2840728.2840764"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:26:07Z","timestamp":1563405967000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}