2022
DOI: 10.1155/2022/1580444
|View full text |Cite|
|
Sign up to set email alerts
|

Identity-Based Designated-Verifier Proxy Signature Scheme with Information Recovery in Telemedicine System

Abstract: With the promotion of Remote Medical Treatment, the sharing of big telemedicine data becomes more and more popular. Telemedicine based on wireless sensor networks collects blood pressure, pH value, pulse, and other medical information from the telemedicine healthcare terminal. The medical information is sent to the hospital or medical server for processing. The security protection of patient medical data, such as confidentiality and authenticity, has gradually become a critical problem to be solved in the deve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…The concept [11], [37], [30] is as follows: Typically, if you have a problem, you must visit a doctor and wait in a controlled setting while they take some measurements. Your electrocardiogram, electromyogram, and blood pressure might all be monitored, which is obviously very inconvenient for many people because they have to take time off of work.…”
Section: Telemedicinementioning
confidence: 99%
“…The concept [11], [37], [30] is as follows: Typically, if you have a problem, you must visit a doctor and wait in a controlled setting while they take some measurements. Your electrocardiogram, electromyogram, and blood pressure might all be monitored, which is obviously very inconvenient for many people because they have to take time off of work.…”
Section: Telemedicinementioning
confidence: 99%
“…Data recovery and clustering are of great signi cance to the analysis of high-dimensional data [9][10][11][12][13][14]. Many highdimensional data usually exist approximately in low-dimensional subspaces, and the low rank prior of data becomes the key to e ective data recovery [15][16][17][18]. In cluster analysis, many data are usually modeled as coming from multiple cluster subspaces.…”
Section: Introductionmentioning
confidence: 99%
“…This article has been retracted by Hindawi following an investigation undertaken by the publisher [1]. This investigation has uncovered evidence of one or more of the following indicators of systematic manipulation of the publication process:…”
mentioning
confidence: 99%