{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:00Z","timestamp":1750220340219,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["NPRP10-0125-170250"],"award-info":[{"award-number":["NPRP10-0125-170250"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508082","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"58-63","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System"],"prefix":"10.1145","author":[{"given":"Mahima","family":"Aggarwal","sequence":"first","affiliation":[{"name":"KINDI Center for Computing Research, College of Engineering, Qatar University, Qatar"}]},{"given":"Mohammed","family":"Zubair","sequence":"additional","affiliation":[{"name":"KINDI Center for Computing Research, College of Engineering, Qatar University, Qatar"}]},{"given":"Devrim","family":"Unal","sequence":"additional","affiliation":[{"name":"KINDI Center for Computing Research, College of Engineering, Qatar University, Qatar"}]},{"given":"Abdulla","family":"Al-Ali","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, College of Engineering, Qatar University, Qatar"}]},{"given":"Thomas","family":"Reimann","sequence":"additional","affiliation":[{"name":"Ambulance Services, Hamad Medical Corporation, Qatar"}]},{"given":"Guillaume","family":"Alinier","sequence":"additional","affiliation":[{"name":"Ambulance Services, Hamad Medical Corporation, Qatar"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757844"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.11.012"},{"key":"#cr-split#-e_1_3_2_1_3_1.1","doi-asserted-by":"crossref","unstructured":"Ian Blake Gadiel Seroussi and Nigel Smart (Eds.). 2005. Advances in Elliptic Curve Cryptography. Cambridge University Press. https:\/\/doi.org\/10.1017\/CBO9780511546570 10.1017\/CBO9780511546570","DOI":"10.1017\/CBO9780511546570"},{"key":"#cr-split#-e_1_3_2_1_3_1.2","doi-asserted-by":"crossref","unstructured":"Ian Blake Gadiel Seroussi and Nigel Smart (Eds.). 2005. Advances in Elliptic Curve Cryptography. Cambridge University Press. https:\/\/doi.org\/10.1017\/CBO9780511546570","DOI":"10.1017\/CBO9780511546570"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23822-2_11"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_26"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1332477.1333439"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2007.12.010"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2007.12.010"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_27"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.04.103"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2903785"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_4"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"e_1_3_2_1_14_1","unstructured":"Miracl. [n.d.]. MIRACL\/MIRACL: MIRACL CRYPTOGRAPHIC SDK: Multiprecision integer and rational arithmetic cryptographic library is a C software library that is widely regarded by developers as the gold standard open source SDK for elliptic curve cryptography (ECC).https:\/\/github.com\/miracl\/MIRACL  Miracl. [n.d.]. MIRACL\/MIRACL: MIRACL CRYPTOGRAPHIC SDK: Multiprecision integer and rational arithmetic cryptographic library is a C software library that is widely regarded by developers as the gold standard open source SDK for elliptic curve cryptography (ECC).https:\/\/github.com\/miracl\/MIRACL"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102304.3102338"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.15803\/ijnc.10.2_174"},{"key":"e_1_3_2_1_17_1","first-page":"5521","article-title":"Identity-based cryptography and comparison with traditional public key encryption: A survey","volume":"5","author":"Phaneendra HD","year":"2014","unstructured":"HD Phaneendra 2014 . Identity-based cryptography and comparison with traditional public key encryption: A survey . International Journal of Computer Science and Information Technologies 5 , 4(2014), 5521 \u2013 5525 . HD Phaneendra 2014. Identity-based cryptography and comparison with traditional public key encryption: A survey. International Journal of Computer Science and Information Technologies 5, 4(2014), 5521\u20135525.","journal-title":"International Journal of Computer Science and Information Technologies"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.078"},{"volume-title":"Healthcare, Vol.\u00a08","author":"Seh Adil\u00a0Hussain","key":"e_1_3_2_1_20_1","unstructured":"Adil\u00a0Hussain Seh , Mohammad Zarour , Mamdouh Alenezi , Amal\u00a0Krishna Sarkar , Alka Agrawal , Rajeev Kumar , and Raees Ahmad\u00a0Khan . 2020. Healthcare data breaches: Insights and implications . In Healthcare, Vol.\u00a08 . Multidisciplinary Digital Publishing Institute , 133. Adil\u00a0Hussain Seh, Mohammad Zarour, Mamdouh Alenezi, Amal\u00a0Krishna Sarkar, Alka Agrawal, Rajeev Kumar, and Raees Ahmad\u00a0Khan. 2020. Healthcare data breaches: Insights and implications. In Healthcare, Vol.\u00a08. Multidisciplinary Digital Publishing Institute, 133."},{"key":"e_1_3_2_1_21_1","volume-title":"Workshop on the theory and application of cryptographic techniques. Springer, 47\u201353","author":"Shamir Adi","year":"1984","unstructured":"Adi Shamir . 1984 . Identity-based cryptosystems and signature schemes . In Workshop on the theory and application of cryptographic techniques. Springer, 47\u201353 . Adi Shamir. 1984. Identity-based cryptosystems and signature schemes. In Workshop on the theory and application of cryptographic techniques. Springer, 47\u201353."},{"key":"e_1_3_2_1_22_1","volume-title":"Review of security challenges in healthcare internet of things. Wireless Networks","author":"Somasundaram R","year":"2020","unstructured":"R Somasundaram and Mythili Thirugnanam . 2020. Review of security challenges in healthcare internet of things. Wireless Networks ( 2020 ), 1\u20137. R Somasundaram and Mythili Thirugnanam. 2020. Review of security challenges in healthcare internet of things. Wireless Networks (2020), 1\u20137."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03028-9"},{"key":"e_1_3_2_1_24_1","volume-title":"On the Euclidean distance of images","author":"Wang Liwei","year":"2005","unstructured":"Liwei Wang , Yan Zhang , and Jufu Feng . 2005. On the Euclidean distance of images . IEEE transactions on pattern analysis and machine intelligence 27, 8( 2005 ), 1334\u20131339. Liwei Wang, Yan Zhang, and Jufu Feng. 2005. On the Euclidean distance of images. IEEE transactions on pattern analysis and machine intelligence 27, 8(2005), 1334\u20131339."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_7"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSP.2010.5656719"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341325.3342000"}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","acronym":"ICFNDS 2021","location":"Dubai United Arab Emirates"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508082","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:30Z","timestamp":1750191150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508082"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":28,"alternative-id":["10.1145\/3508072.3508082","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508082","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}