{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T16:11:10Z","timestamp":1744215070609,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,1,25]],"date-time":"2016-01-25T00:00:00Z","timestamp":1453680000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"crossref","award":["2010CB731803"],"award-info":[{"award-number":["2010CB731803"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"NSF of China","doi-asserted-by":"crossref","award":["U1405251, 61221003, 61290322, 61174127, and 61273181"],"award-info":[{"award-number":["U1405251, 61221003, 61290322, 61174127, and 61273181"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100002338","name":"Ministry of Education of China","doi-asserted-by":"crossref","award":["NCET 13-0358, 20110073130005, and 20110073120025"],"award-info":[{"award-number":["NCET 13-0358, 20110073130005, and 20110073120025"]}],"id":[{"id":"10.13039\/501100002338","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Science and Technology Commission of Shanghai Municipality (STCSM)","award":["13QA1401900"],"award-info":[{"award-number":["13QA1401900"]}]},{"DOI":"10.13039\/501100003399","name":"Science and Technology Commission of Shanghai Municipality","doi-asserted-by":"publisher","award":["14511107903"],"award-info":[{"award-number":["14511107903"]}],"id":[{"id":"10.13039\/501100003399","id-type":"DOI","asserted-by":"publisher"}]},{"name":"medical and engineering interdiscipline project","award":["YG2013ZD0504"],"award-info":[{"award-number":["YG2013ZD0504"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s12083-016-0429-4","type":"journal-article","created":{"date-parts":[[2016,1,25]],"date-time":"2016-01-25T02:50:59Z","timestamp":1453690259000},"page":"340-356","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Privacy-preserving design for emergency response scheduling system in medical social networks"],"prefix":"10.1007","volume":"10","author":[{"given":"Wenbin","family":"Yu","sequence":"first","affiliation":[]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Cailian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xinping","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,25]]},"reference":[{"issue":"3","key":"429_CR1","first-page":"146","volume":"24","author":"R Lu","year":"2012","unstructured":"Lu R, Lin X, Shen X (2012) SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE IEEE Trans. Parallel Distrib Syst 24(3):146. doi: 10.1109\/TPDS","journal-title":"IEEE IEEE Trans. Parallel Distrib Syst"},{"key":"429_CR2","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.ins.2014.06.011","volume":"284","author":"K Zhang","year":"2014","unstructured":"Zhang K, Liang X, Baura M, Lu R, Shen X S (2014) PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs. Information Sciences 284:130\u2013 141","journal-title":"Information Sciences"},{"issue":"1","key":"429_CR3","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/JETCAS.2012.2187243","volume":"2","author":"MM Alam","year":"2012","unstructured":"Alam M M, Berder O, Menard D, Sentieys O (2012) TAD-MAC: traffic-aware dynamic MAC protocol for wireless body area sensor networks. IEEE Journal on Emerging and Selected Topics in Circuits and Systems 2 (1):109\u2013119","journal-title":"IEEE Journal on Emerging and Selected Topics in Circuits and Systems"},{"issue":"4","key":"429_CR4","first-page":"261","volume":"2","author":"S Pavlopoulos","year":"1998","unstructured":"Pavlopoulos S, Kyriacou E, Berler A, Dembeyiotis S, Koutsouris D (1998) A novel emergency telemedicine system based on wireless communication technology-AMBULANCE. IEEE Trans Inf Technol Biomed 2(4):261\u2013267. doi: 10.1109\/4233.737581","journal-title":"IEEE Trans Inf Technol Biomed"},{"issue":"6","key":"429_CR5","first-page":"1036","volume":"43","author":"TY Kim","year":"2010","unstructured":"Kim TY, Coenen A, Hardiker N (2010) A quality improvement model for healthcare terminologies. J Biomed Inform 43(6):1036\u20131043. doi: 10.1016\/j.jbi.2010.08.006","journal-title":"J Biomed Inform"},{"issue":"6","key":"429_CR6","first-page":"985","volume":"8","author":"H Lin","year":"2013","unstructured":"Lin H, Shao J, Zhang C, Fang Y (2013) CAM: Cloud-assisted privacy preserving mobile health monitoring. IEEE Trans Inf. Forensics Secur 8(6):985\u2013997. doi: 10.1109\/TIFS.2013.2255593","journal-title":"IEEE Trans Inf. Forensics Secur"},{"key":"429_CR7","doi-asserted-by":"crossref","unstructured":"Dhukaram A, Baber C, Elloumi L, van Beijnum B J, De Stefanis P (2011) End-user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust. In: International Conference on Pervasive Computing Technologies for Healthcare, p 478\u2013484","DOI":"10.4108\/icst.pervasivehealth.2011.246116"},{"key":"429_CR8","first-page":"1","volume-title":"IEEE GLOBECOM","author":"L Chen","year":"2011","unstructured":"Chen L, Cao Z, Lu R, Liang X, Shen X (2011) EPF: An event-aided packet forwarding protocol for privacy-preserving mobile healthcare social networks. In: IEEE GLOBECOM. IEEE, Houston, pp 1\u20135"},{"key":"429_CR9","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/2221924.2221927","volume-title":"Proceedings of the Fifth International Conference on Body Area Networks","author":"R Lu","year":"2010","unstructured":"Lu R, Lin X, Liang X, Shen X S (2010) Secure handshake with symptoms-matching: The essential to the success of mhealthcare social network. In: Proceedings of the Fifth International Conference on Body Area Networks. ACM, New York , pp 8\u201315"},{"key":"429_CR10","doi-asserted-by":"publisher","unstructured":"Lu R, Lin X, Luan T, Liang X, Li X, Chen L, Shen X (2012) Prefilter: An efficient privacy-preserving relay filtering scheme for delay tolerant networks. In: Proceedings IEEE INFOCOM, p 1395\u20131403. doi: 10.1109\/INFCOM.2012.6195504","DOI":"10.1109\/INFCOM.2012.6195504"},{"issue":"2","key":"429_CR11","first-page":"419","volume":"18","author":"Y Tong","year":"2014","unstructured":"Tong Y, Sun J, Chow S, Li P (2014) Cloud-assisted mobile-access of health data with privacy and auditability. IEEE Journal of Biomedical and Health Informatics 18(2):419\u2013429. doi: 10.1109\/JBHI.2013.2294932","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"issue":"2","key":"429_CR12","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/JCN.2011.6157409","volume":"13","author":"X Liang","year":"2011","unstructured":"Liang X, Lu R, Chen L, Lin X, Shen X (2011) PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks. J Complex Networks 13(2):102\u2013112","journal-title":"J Complex Networks"},{"key":"429_CR13","doi-asserted-by":"publisher","unstructured":"Sun J, Zhu X, Fang Y (2010) Preserving privacy in emergency response based on wireless body sensor networks. In: IEEE GLOBECOM, p 1\u20136. doi: 10.1109\/GLOCOM.2010.5684209","DOI":"10.1109\/GLOCOM.2010.5684209"},{"key":"429_CR14","first-page":"350","volume-title":"IEEE Symposium on Security and Privacy","author":"E Shi","year":"2007","unstructured":"Shi E, Bethencourt J, Chan T H, Song D, Perrig A (2007) Multi-dimensional range query over encrypted data. In: IEEE Symposium on Security and Privacy. IEEE, Berkeley, pp 350\u2013 364"},{"key":"429_CR15","first-page":"1399","volume-title":"Military Communications Conference","author":"H Lin","year":"2011","unstructured":"Lin H, Zhu X, Fang Y, Zhang C, Cao Z (2011) Efficient trust based information sharing schemes over distributed collaborative networks. In: Military Communications Conference. IEEE, Baltimore, pp 1399\u20131403"},{"key":"429_CR16","first-page":"290","volume-title":"Advances in Cryptology","author":"X Boyen","year":"2006","unstructured":"Boyen X, Waters B (2006) Anonymous hierarchical identity-based encryption (without random oracles). In: Advances in Cryptology. Springer, Santa Barbara, pp 290\u2013307"},{"issue":"5","key":"429_CR17","doi-asserted-by":"crossref","first-page":"1639","DOI":"10.1109\/18.259647","volume":"39","author":"AJ Menezes","year":"1993","unstructured":"Menezes A J, Okamoto T, Vanstone S A (1993) Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans Inf Theory 39(5):1639\u20131646","journal-title":"IEEE Trans Inf Theory"},{"issue":"5","key":"429_CR18","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/18.771254","volume":"45","author":"G Frey","year":"1999","unstructured":"Frey G, Muller M, Ruck H G (1999) The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Trans Inf Theory 45(5):1717\u20131719","journal-title":"IEEE Trans Inf Theory"},{"key":"429_CR19","doi-asserted-by":"crossref","unstructured":"Galbraith S D, Harrison K, Soldera D (2002) Implementing the tate pairing. In: Algorithmic Number Theory, pp 324C337. Springer, Sydney","DOI":"10.1007\/3-540-45455-1_26"},{"issue":"1","key":"429_CR20","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.tcs.2003.06.002","volume":"321","author":"T Garefalakis","year":"2004","unstructured":"Garefalakis T (2004) The generalized weil pairing and the discrete logarithm problem on elliptic curves. Theor Comput Sci 321(1):59\u201372","journal-title":"Theor Comput Sci"},{"issue":"9","key":"429_CR21","first-page":"84","volume":"13","author":"L Guo","year":"2013","unstructured":"Guo L, Zhang C, Sun J, Fang Y (2013) A privacy-preserving attribute-based authentication system for mobile health networks. IEEE Trans Mob Comput 13(9):84. doi: 10.1109\/TMC","journal-title":"IEEE Trans Mob Comput"},{"key":"429_CR22","unstructured":"Lynn B (2012) The pairing-based cryptography (PBC) library. http:\/\/crypto.stanford.edu\/pbc"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0429-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-016-0429-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0429-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-016-0429-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T10:53:22Z","timestamp":1589626402000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-016-0429-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,25]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["429"],"URL":"https:\/\/doi.org\/10.1007\/s12083-016-0429-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2016,1,25]]}}}