{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T02:30:51Z","timestamp":1767925851677,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/iccd.2013.6657078","type":"proceedings-article","created":{"date-parts":[[2013,11,11]],"date-time":"2013-11-11T22:22:16Z","timestamp":1384208536000},"page":"443-446","source":"Crossref","is-referenced-by-count":56,"title":["Assessment of cloud-based health monitoring using Homomorphic Encryption"],"prefix":"10.1109","author":[{"given":"Ovunc","family":"Kocabas","sequence":"first","affiliation":[]},{"given":"Tolga","family":"Soyata","sequence":"additional","affiliation":[]},{"given":"Jean-Philippe","family":"Couderc","sequence":"additional","affiliation":[]},{"given":"Mehmet","family":"Aktas","sequence":"additional","affiliation":[]},{"given":"Jean","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","author":"halevi","year":"0"},{"key":"17","first-page":"420","article-title":"Fully homomorphic encryption with relatively small key and ciphertext sizes","author":"smart","year":"2010","journal-title":"PKC"},{"key":"18","first-page":"377","article-title":"Faster fully homomorphic encryption","author":"stehle?","year":"2010","journal-title":"ASIACRYPT"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.94"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"14","first-page":"487","article-title":"Fully homomorphic encryption over the integers with shorter public keys","author":"coron","year":"2011","journal-title":"Crypto"},{"key":"11","first-page":"24","article-title":"Fully homomorphic encryption over the integers","author":"van dijk","year":"2010","journal-title":"Eurocrypt"},{"key":"12","first-page":"501","article-title":"Fully homomorphic encryption from ring-lwe and security for key dependent messages","volume":"6841","author":"brakerski","year":"2011","journal-title":"Crypto"},{"key":"21","year":"0","journal-title":"Microchip Embedded Security"},{"key":"20","first-page":"850","article-title":"Homomorphic evaluation of the AES circuit","author":"gentry","year":"2012","journal-title":"Crypto"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2012.6249269"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.1117\/12.919146","article-title":"Combat: Mobile cloud-based compute\/communications infrastructure for battlefield applications","volume":"8403","author":"tolga soyata","year":"2012","journal-title":"Proceedings of SPIE"},{"key":"24","article-title":"Accelerating mobile cloud computing: A survey","author":"soyata","year":"2013","journal-title":"Communication Infrastructures for Cloud Computing"},{"key":"25","first-page":"129","article-title":"Implementing gentry's fully-homomorphic encryption scheme","author":"gentry","year":"2011","journal-title":"Eurocrypt"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"27","author":"smart","year":"2011","journal-title":"Fully Homomorphic SIMD Operations"},{"key":"3","year":"0","journal-title":"Windows Azure"},{"key":"2","year":"0"},{"key":"10","first-page":"6252","article-title":"The telemetric and holter ecg warehouse initiative (thew): A data repository for the design, implementation and validation of ecg-related technologies","volume":"6252","author":"courderc","year":"2010","journal-title":"IEEE publishing"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.5603\/CJ.2012.0039"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"6","year":"2001","journal-title":"Advanced Encryption Standard (AES)"},{"key":"5","author":"leaf","year":"0","journal-title":"World's Thinnest 3-Lead ECG Patch"},{"key":"4","year":"0","journal-title":"Google App Engine"},{"key":"9","year":"0","journal-title":"PROgramming Computation on EncryptEd Data (PROCEED)"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"}],"event":{"name":"2013 IEEE 31st International Conference on Computer Design (ICCD)","location":"Asheville, NC, USA","start":{"date-parts":[[2013,10,6]]},"end":{"date-parts":[[2013,10,9]]}},"container-title":["2013 IEEE 31st International Conference on Computer Design (ICCD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6644329\/6657009\/06657078.pdf?arnumber=6657078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:45:50Z","timestamp":1498095950000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6657078\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iccd.2013.6657078","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}