{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:15:16Z","timestamp":1766578516113,"version":"3.41.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319269603"},{"type":"electronic","value":"9783319269610"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26961-0_21","type":"book-chapter","created":{"date-parts":[[2015,12,16]],"date-time":"2015-12-16T13:07:52Z","timestamp":1450271272000},"page":"345-363","source":"Crossref","is-referenced-by-count":14,"title":["Functional Encryption in IoT E-Health Care System"],"prefix":"10.1007","author":[{"given":"Dhruti","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Devesh","family":"Jinwala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,31]]},"reference":[{"issue":"15","key":"21_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Advanced crypto software collection: the cpabe toolkit (2011)","key":"21_CR2"},{"doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 321\u2013334. IEEE (2007)","key":"21_CR3","DOI":"10.1109\/SP.2007.11"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-642-19571-6_16","volume-title":"Theory of Cryptography","author":"D Boneh","year":"2011","unstructured":"Boneh, D., Sahai, A., Waters, B.: Functional encryption: definitions and challenges. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 253\u2013273. Springer, Heidelberg (2011)"},{"issue":"11","key":"21_CR6","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/2366316.2366333","volume":"55","author":"D Boneh","year":"2012","unstructured":"Boneh, D., Sahai, A., Waters, B.: Functional encryption: a new vision for public-key cryptography. Commun. ACM 55(11), 56\u201364 (2012)","journal-title":"Commun. ACM"},{"unstructured":"Frank, A., Asuncion, A., et al.: Uci machine learning repository (2010)","key":"21_CR7"},{"unstructured":"Goldwasser, S., Kalai, Y.T., Popa, R.A., Vaikuntanathan, V., Zeldovich, N.: Succinct functional encryption and applications: reusable garbled circuits and beyond. IACR Cryptology ePrint Archive 2012, 733 (2012)","key":"21_CR8"},{"doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398. ACM (2006)","key":"21_CR9","DOI":"10.1145\/1180405.1180418"},{"doi-asserted-by":"crossref","unstructured":"Huan, W., et al.: Studying on internet of things based on fingerprint identification. In: 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), vol. 14 (2010)","key":"21_CR10","DOI":"10.1109\/ICCASM.2010.5622215"},{"issue":"2","key":"21_CR11","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: Rfid security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2), 381\u2013394 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"11","key":"21_CR12","first-page":"20","volume":"90","author":"JS Kumar","year":"2014","unstructured":"Kumar, J.S., Patel, D.R.: A survey on internet of things: security and privacy issues. Int. J. Comput. Appl. 90(11), 20\u201326 (2014)","journal-title":"Int. J. Comput. Appl."},{"issue":"3","key":"21_CR13","first-page":"355","volume":"6","author":"XH Le","year":"2011","unstructured":"Le, X.H., Khalid, M., Sankar, R., Lee, S.: An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. J. Netw. 6(3), 355\u2013364 (2011)","journal-title":"J. Netw."},{"doi-asserted-by":"crossref","unstructured":"Li, X., Xuan, Z., Wen, L.: Research on the architecture of trusted security system based on the internet of things. In: 2011 International Conference on Intelligent Computation Technology and Automation (ICICTA), vol. 2, pp. 1172\u20131175. IEEE (2011)","key":"21_CR14","DOI":"10.1109\/ICICTA.2011.578"},{"doi-asserted-by":"crossref","unstructured":"Liu, J., Xiao, Y., Chen, C.P.: Authentication and access control in the internet of things. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pp. 588\u2013592. IEEE (2012)","key":"21_CR15","DOI":"10.1109\/ICDCSW.2012.23"},{"unstructured":"Lynn, B., et al.: The pairing-based cryptography library. Internet: crypto. stanford. edu\/pbc\/[27 March 2013] (2006)","key":"21_CR16"},{"unstructured":"Mayer, C.P.: Security and privacy challenges in the internet of things. Electron. Commun. EASST 17 (2009)","key":"21_CR17"},{"doi-asserted-by":"crossref","unstructured":"Mon, E.E., Naing, T.T.: The privacy-aware access control system using attribute-and role-based access control in private cloud. In: 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), pp. 447\u2013451. IEEE (2011)","key":"21_CR18","DOI":"10.1109\/ICBNMT.2011.6155974"},{"issue":"8","key":"21_CR19","doi-asserted-by":"publisher","first-page":"14786","DOI":"10.3390\/s140814786","volume":"14","author":"B Ndibanje","year":"2014","unstructured":"Ndibanje, B., Lee, H.J., Lee, S.G.: Security analysis and improvements of authentication and access control in the internet of things. Sensors 14(8), 14786\u201314805 (2014)","journal-title":"Sensors"},{"doi-asserted-by":"crossref","unstructured":"Oleshchuk, V.: Internet of things and privacy preserving technologies. In: 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (2009)","key":"21_CR20","DOI":"10.1109\/WIRELESSVITAE.2009.5172470"},{"unstructured":"O\u2019Neill, A.: Definitional issues in functional encryption. IACR Cryptology ePrint Archive 2010, 556 (2010)","key":"21_CR21"},{"issue":"9","key":"21_CR22","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MC.2011.291","volume":"44","author":"R Roman","year":"2011","unstructured":"Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51\u201358 (2011)","journal-title":"Computer"},{"issue":"6","key":"21_CR23","first-page":"155","volume":"10","author":"O Said","year":"2013","unstructured":"Said, O.: Development of an innovative internet of things security system. Int. J. Comput. Sci. Issues (IJCSI) 10(6), 155\u2013161 (2013)","journal-title":"Int. J. Comput. Sci. Issues (IJCSI)"},{"doi-asserted-by":"crossref","unstructured":"Suo, H., Wan, J., Zou, C., Liu, J.: Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 3, pp. 648\u2013651. IEEE (2012)","key":"21_CR24","DOI":"10.1109\/ICCSEE.2012.373"},{"doi-asserted-by":"crossref","unstructured":"Wang, K., Bao, J., Wu, M., Lu, W.: Research on security management for internet of things. In: 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), vol. 15 (2010)","key":"21_CR25","DOI":"10.1109\/ICCASM.2010.5622549"},{"issue":"1","key":"21_CR26","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"RH Weber","year":"2010","unstructured":"Weber, R.H.: Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23\u201330 (2010)","journal-title":"Comput. Law Secur. Rev."},{"doi-asserted-by":"crossref","unstructured":"Wong, K.H., Zheng, Y., Cao, J., Wang, S.: A dynamic user authentication scheme for wireless sensor networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, p. 8. IEEE (2006)","key":"21_CR27","DOI":"10.1109\/SUTC.2006.1636182"},{"doi-asserted-by":"crossref","unstructured":"Xin-fang, S., Xiao-hua, H.: A new access control scheme based on protection of sensitive attributes. In: 2012 7th International Conference on Computer Science & Education (ICCSE), pp. 1021\u20131024. IEEE (2012)","key":"21_CR28","DOI":"10.1109\/ICCSE.2012.6295238"},{"key":"21_CR29","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.12785\/amis\/080416","volume":"8","author":"N Ye","year":"2014","unstructured":"Ye, N., Zhu, Y., Wang, R.C., Malekian, R., Min, L.: An efficient authentication and access control scheme for perception layer of internet of things. Int. J. Appl. Math. Inf. Sci. 8, 1617\u20131624 (2014)","journal-title":"Int. J. Appl. Math. Inf. Sci."},{"issue":"4","key":"21_CR30","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1145\/1218556.1218559","volume":"2","author":"S Zhu","year":"2006","unstructured":"Zhu, S., Setia, S., Jajodia, S.: Leap $$+$$ : efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(4), 500\u2013528 (2006)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26961-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T20:20:24Z","timestamp":1748722824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26961-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319269603","9783319269610"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26961-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}