2017 9th International Conference on Communication Systems and Networks (COMSNETS) 2017
DOI: 10.1109/comsnets.2017.7945441
|View full text |Cite
|
Sign up to set email alerts
|

Group authorization using threshold signatures for medical procedures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…Wang [27] put forward the identitybased distributed provable data possession (ID-DPDP) scheme which achieved public auditing of the data stored in multiple clouds. Since then, the threshold signature has attracted a lot of attention in the research of data integrity auditing [28,29].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Wang [27] put forward the identitybased distributed provable data possession (ID-DPDP) scheme which achieved public auditing of the data stored in multiple clouds. Since then, the threshold signature has attracted a lot of attention in the research of data integrity auditing [28,29].…”
Section: Literature Reviewmentioning
confidence: 99%