{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:50:14Z","timestamp":1776077414228,"version":"3.50.1"},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61728303"],"award-info":[{"award-number":["61728303"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China","award":["ICT1800417"],"award-info":[{"award-number":["ICT1800417"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Biomed. Health Inform."],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1109\/jbhi.2020.2973467","type":"journal-article","created":{"date-parts":[[2020,2,12]],"date-time":"2020-02-12T20:51:46Z","timestamp":1581540706000},"page":"2499-2505","source":"Crossref","is-referenced-by-count":212,"title":["Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0"],"prefix":"10.1109","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2678-8070","authenticated-orcid":false,"given":"Han","family":"Qiu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1004-0140","authenticated-orcid":false,"given":"Meikang","family":"Qiu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0693-6574","authenticated-orcid":false,"given":"Meiqin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Gerard","family":"Memmi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2911679"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1882992.1883024"},{"key":"ref12","author":"daemen","year":"2013","journal-title":"The Design of RIJNDAEL AES-The Advanced Encryption Standard"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23357"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2011.69"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4868"},{"key":"ref16","first-page":"26","article-title":"Using an approximated one-time pad to secure short messaging service (sms)","author":"croft","year":"0","journal-title":"Proc Southern Afr Telecommun Netw Appl Conf South Afr"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s003300101100"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2011.02.039"},{"key":"ref19","article-title":"Health it dashboard","author":"it","year":"2018","journal-title":"Office of the National Coordinator for Health Information Technology"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.08.059"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926354"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2825289"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.31128\/AJGP-06-18-4596"},{"key":"ref8","article-title":"Giant equifax data breach: 143 million people could be affected","author":"o\u2019brien","year":"2017","journal-title":"CNN Tech"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-018-0921-x"},{"key":"ref9","article-title":"Nsa's prism surveillance program: How it works and what it can do","volume":"8","author":"ball","year":"2013","journal-title":"The Guardian"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47617-9"},{"key":"ref20","first-page":"1","article-title":"Mars: A 64-core ARMv8 processor","author":"charles","year":"0","journal-title":"Proc IEEE Hot Chips 27 Symp"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1038\/srep26286","article-title":"Deep learning as a tool for increased accuracy and efficiency of histopathological diagnosis","volume":"6","author":"litjens","year":"2016","journal-title":"Scientific Reports"},{"key":"ref21","article-title":"Benchmarking Wolfssl and Wolfcrypt","year":"2018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.59"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2893433"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2011.03.005"}],"container-title":["IEEE Journal of Biomedical and Health Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221020\/9186373\/08995537.pdf?arnumber=8995537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:19:59Z","timestamp":1651079999000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8995537\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":25,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/jbhi.2020.2973467","relation":{},"ISSN":["2168-2194","2168-2208"],"issn-type":[{"value":"2168-2194","type":"print"},{"value":"2168-2208","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9]]}}}