{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:32:20Z","timestamp":1773513140418,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030932053","type":"print"},{"value":"9783030932060","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-93206-0_23","type":"book-chapter","created":{"date-parts":[[2021,12,16]],"date-time":"2021-12-16T14:04:49Z","timestamp":1639663489000},"page":"374-391","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework"],"prefix":"10.1007","author":[{"given":"Huijie","family":"Yang","sequence":"first","affiliation":[]},{"given":"Tianqi","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,17]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.future.2020.07.047","volume":"114","author":"F Ali","year":"2021","unstructured":"Ali, F., et al.: An intelligent healthcare monitoring framework using wearable sensors and social networking data. Future Gener. Comput. Syst. 114, 23\u201343 (2021)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"23_CR2","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/TIFS.2017.2746058","volume":"13","author":"W Biesmans","year":"2017","unstructured":"Biesmans, W., Balasch, J., Rial, A., Preneel, B., Verbauwhede, I.: Private mobile pay-TV from priced oblivious transfer. IEEE Trans. Inf. Forensics Secur. 13(2), 280\u2013291 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"23_CR3","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1007\/s11606-013-2455-8","volume":"28","author":"NV Chawla","year":"2013","unstructured":"Chawla, N.V., Davis, D.A.: Bringing big data to personalized healthcare: a patient-centered framework. J. Gen. Intern. Med. 28(3), 660\u2013665 (2013). https:\/\/doi.org\/10.1007\/s11606-013-2455-8","journal-title":"J. Gen. Intern. Med."},{"key":"23_CR4","unstructured":"Chen, Y., Chou, J.S., Hou, X.W.: A novel k-out-of-n oblivious transfer protocols based on bilinear pairings. IACR Cryptology ePrint Archive 2010\/27 (2010)"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-540-30580-4_12","volume-title":"Public Key Cryptography - PKC 2005","author":"C-K Chu","year":"2005","unstructured":"Chu, C.-K., Tzeng, W.-G.: Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 172\u2013183. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-30580-4_12"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/3-540-46035-7_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2002","author":"R Cramer","year":"2002","unstructured":"Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45\u201364. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-46035-7_4"},{"issue":"5","key":"23_CR7","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/TIFS.2014.2309858","volume":"9","author":"F Guo","year":"2014","unstructured":"Guo, F., Mu, Y., Susilo, W., Wong, D.S., Varadharajan, V.: CP-ABE with constant-size keys for lightweight devices. IEEE Trans. Inf. Forensics Secur. 9(5), 763\u2013771 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"23_CR8","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/s00145-010-9092-8","volume":"25","author":"S Halevi","year":"2012","unstructured":"Halevi, S., Kalai, Y.T.: Smooth projective hashing and two-message oblivious transfer. J. Cryptol. 25(1), 158\u2013193 (2012). https:\/\/doi.org\/10.1007\/s00145-010-9092-8","journal-title":"J. Cryptol."},{"issue":"2","key":"23_CR9","doi-asserted-by":"publisher","first-page":"1416","DOI":"10.1109\/TII.2020.2982942","volume":"17","author":"C Huang","year":"2020","unstructured":"Huang, C., Liu, D., Ni, J., Lu, R., Shen, X.: Achieving accountable and efficient data sharing in industrial Internet of Things. IEEE Trans. Ind. Inf. 17(2), 1416\u20131427 (2020)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/11426639_5","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"YT Kalai","year":"2005","unstructured":"Kalai, Y.T.: Smooth projective hashing and two-message oblivious transfer. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 78\u201395. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11426639_5"},{"issue":"1","key":"23_CR11","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1080\/02533839.2018.1537754","volume":"42","author":"YN Liu","year":"2019","unstructured":"Liu, Y.N., Wang, Y.P.: An improved electronic medical record system (IEMRS) using oblivious transfer. J. Chin. Inst. Eng. 42(1), 48\u201353 (2019)","journal-title":"J. Chin. Inst. Eng."},{"issue":"3","key":"23_CR12","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/TPDS.2012.146","volume":"24","author":"R Lu","year":"2012","unstructured":"Lu, R., Lin, X., Shen, X.: SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3), 614\u2013624 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"1","key":"23_CR13","first-page":"1","volume":"15","author":"VK Omachonu","year":"2010","unstructured":"Omachonu, V.K., Einspruch, N.G.: Innovation in healthcare delivery systems: a conceptual framework. Innov. J. Public Sect. Innov. J. 15(1), 1\u201320 (2010)","journal-title":"Innov. J. Public Sect. Innov. J."},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1016\/j.eswa.2017.06.027","volume":"87","author":"MI Pramanik","year":"2017","unstructured":"Pramanik, M.I., Lau, R.Y., Demirkan, H., Azad, M.A.K.: Smart health: big data enabled health paradigm within smart cities. Expert Syst. Appl. 87, 370\u2013383 (2017)","journal-title":"Expert Syst. Appl."},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"1243","DOI":"10.1016\/j.procs.2018.05.040","volume":"132","author":"N Sharma","year":"2018","unstructured":"Sharma, N., Bhatt, R.: Privacy preservation in WSN for healthcare application. Procedia Comput. Sci. 132, 1243\u20131252 (2018)","journal-title":"Procedia Comput. Sci."},{"key":"23_CR16","doi-asserted-by":"publisher","unstructured":"Shen, J., Gui, Z., Chen, X., Zhang, J., Xiang, Y.: Lightweight and certificateless multi-receiver secure data transmission protocol for wireless body area networks. IEEE Trans. Dependable Secure Comput. (2020). https:\/\/doi.org\/10.1109\/TDSC.2020.3025288","DOI":"10.1109\/TDSC.2020.3025288"},{"issue":"1","key":"23_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MCE.2017.2755378","volume":"7","author":"P Sundaravadivel","year":"2017","unstructured":"Sundaravadivel, P., Kougianos, E., Mohanty, S.P., Ganapathiraju, M.K.: Everything you wanted to know about smart health care: evaluating the different technologies and components of the Internet of Things for better health. IEEE Consum. Electron. Mag. 7(1), 18\u201328 (2017)","journal-title":"IEEE Consum. Electron. Mag."},{"key":"23_CR18","doi-asserted-by":"publisher","unstructured":"Wang, K., Chen, C.M., Tie, Z., Shojafar, M., Kumar, S., Kumari, S.: Forward privacy preservation in IoT enabled healthcare systems. IEEE Trans. Ind. Inform. (2021). https:\/\/doi.org\/10.1109\/TII.2021.3064691","DOI":"10.1109\/TII.2021.3064691"},{"issue":"7","key":"23_CR19","doi-asserted-by":"publisher","first-page":"4359","DOI":"10.1109\/TITS.2020.2973738","volume":"22","author":"X Wang","year":"2021","unstructured":"Wang, X., Kuang, X., Li, J., Li, J., Chen, X., Liu, Z.: Oblivious transfer for privacy-preserving in VANET\u2019s feature matching. IEEE Trans. Intell. Transp. Syst. 22(7), 4359\u20134366 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"1","key":"23_CR20","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1111\/j.1467-9515.2008.00647.x","volume":"43","author":"C Wendt","year":"2009","unstructured":"Wendt, C., Frisina, L., Rothgang, H.: Healthcare system types: a conceptual framework for comparison. Soc. Policy Adm. 43(1), 70\u201390 (2009)","journal-title":"Soc. Policy Adm."},{"issue":"2","key":"23_CR21","doi-asserted-by":"publisher","first-page":"3284","DOI":"10.1109\/JIOT.2018.2882224","volume":"6","author":"X Yang","year":"2018","unstructured":"Yang, X., Lu, R., Shao, J., Tang, X., Yang, H.: An efficient and privacy-preserving disease risk prediction scheme for e-healthcare. IEEE Internet Things J. 6(2), 3284\u20133297 (2018)","journal-title":"IEEE Internet Things J."}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-93206-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T06:05:08Z","timestamp":1643004308000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-93206-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030932053","9783030932060"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-93206-0_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"17 December 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ispec2021.nuist.edu.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"94","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Doble peer review","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}