{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T02:22:11Z","timestamp":1773282131062,"version":"3.50.1"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Commun. Netw."],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/jcn.2011.6157409","type":"journal-article","created":{"date-parts":[[2013,8,30]],"date-time":"2013-08-30T16:25:47Z","timestamp":1377879947000},"page":"102-112","source":"Crossref","is-referenced-by-count":67,"title":["PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks"],"prefix":"10.23919","volume":"13","author":[{"given":"Xiaohui","family":"Liang","sequence":"first","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada, N2L 3G1"}]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada, N2L 3G1"}]},{"given":"Le","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada, N2L 3G1"}]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[{"name":"Faculty of Business and Information Technology, University of Ontario Institute of Technology, Oshawa, Ontario, Canada, L1H 7K4"}]},{"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada, N2L 3G1"}]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872059"},{"key":"ref31","first-page":"22","article-title":"A method for fast revocation of public key certificates and security capabilities","author":"boneh","year":"2001","journal-title":"Proc Usenix Security Symp"},{"key":"ref30","first-page":"579","article-title":"Bounded ciphertext policy attribute based encryption","author":"goyal","year":"2008","journal-title":"Proc ICALP (2)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1248054.1248058"},{"key":"ref11","article-title":"A patient-centric, attribute-based, source-verifiable framework for health record sharing","author":"mohan","year":"2009","journal-title":"Technical Reports"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1750389.1750395"},{"key":"ref13","article-title":"Patient self-controllable access policy on phi in ehealthcare systems","author":"liang","year":"2010","journal-title":"Adv Health Inform Conf"},{"key":"ref14","article-title":"One patient, one record: Report on one-day symposium to promote patient ehealth","author":"leonard","year":"2010","journal-title":"Proc Technique Reports"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.173"},{"key":"ref16","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","author":"waters","year":"2008","journal-title":"Proceedings of the Cryptology EPrint Archive Rep 2003\/092"},{"key":"ref17","first-page":"69","article-title":"Short group signature without random oracles","author":"liang","year":"2007","journal-title":"Proc ICICS"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_1"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-04722-4","article-title":"The Design of Rijndael: AES&#x2014;The Advanced Encryption Standard","author":"daemen","year":"2002"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"ref4","article-title":"Time is critical in treating stroke victims","author":"razack","year":"2010"},{"key":"ref27","first-page":"263","article-title":"Towards a security policy for ubiquitous healthcare systems (position paper)","author":"kim","year":"2006","journal-title":"Proc ICU"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2010.08.006"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2221924.2221927"},{"key":"ref29","first-page":"456","article-title":"Provably secure ciphertext policy abe","author":"cheung","year":"2007","journal-title":"Proc ACM Conf Comput Commun Security"},{"key":"ref5","article-title":"Emergency medical services","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.92"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.socscimed.2010.05.012"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/4233.737581"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.003"},{"key":"ref1","year":"0","journal-title":"List of causes of death by rate"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455823"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062007"},{"key":"ref21","first-page":"223","article-title":"Efficient selective-id secure identity-based encryption without random oracles","author":"boneh","year":"2004","journal-title":"Proc EUROCRYPT"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1109\/JSAC.2009.090502","article-title":"Sage: A strong privacy-preserving scheme against global eavesdropping for ehealth systems","volume":"27","author":"lin","year":"2009","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416350"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1248054.1248057"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1540373.1540383"}],"container-title":["Journal of Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5449605\/6157403\/06157409.pdf?arnumber=6157409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T17:55:40Z","timestamp":1760982940000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6157409\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":32,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jcn.2011.6157409","relation":{},"ISSN":["1976-5541","1229-2370"],"issn-type":[{"value":"1976-5541","type":"electronic"},{"value":"1229-2370","type":"print"}],"subject":[],"published":{"date-parts":[[2011,4]]}}}