Retraction
E-Health Cloud Security Using Timing Enabled Proxy Re-Encryption
Paper Information
Record ID:
42551
Author(s):
Journal:
Publication Date:
May 21, 2018
Retraction Date:
November 07, 2022
(3.0 years years ago)
Subjects:
Institutions:
Countries:
Article Type:
Publisher:
Springer
Open Access:
Yes
PubMed ID:
Not indexed in PubMed
Retraction PubMed ID:
Not indexed in PubMed
Retraction Details
Citations (51)
51
Total Citations13
Post-Retraction(25.5%)
38
Pre-Retraction0
Same DayPost-Retraction Citation Analysis
1
Within 30 days
8
Within 1 year
2
After 2+ years
874
Days since retraction (latest)
Enhancing healthcare data security using RFE and CRHSM for big data
C. Sreedhar, K. Mahesh Babu, Suresh Kallam et al. (9 authors)
Computers in Biology and Medicine
Published: Mar 2025
49 citations
49 citations
874 days after retraction
DNA cryptography based security framework for health-cloud data
Issa Qiqieh, Jafar A. Alzubi, Omar A. Alzubi
Computing
Published: Dec 2024
2 citations
2 citations
777 days after retraction
Identity-Based Threshold Broadcast Proxy Re-encryption Plus Scheme
Liu Xiao-qing, Hui Song, Z. M. Li et al. (6 authors)
Communications in computer and information science
Published: Jan 2024
420 days after retraction
An Efficient CH Based Authentication and Authorization for Secure EHR Using DF-BCrypt and Hashed Access Structure
S. Prathima, R. Durga
Communications in computer and information science
Published: Jan 2024
420 days after retraction
A Comparison of Cloud Security Mechanisms
D. Saravanan, M. Maragatharajan, E. Nirmala et al. (5 authors)
Unknown Journal
Published: Dec 2023
399 days after retraction
A New 3-Bit Hiding Covert Channel Algorithm for Public Data and Medical Data Security Using Format-Based Text Steganography
R. Gurunath, Debabrata Samanta
Journal of Database Management
Open Access
Published: Jun 2023
11 citations
11 citations
206 days after retraction
Analyzing Security and Privacy issues for Multi-Cloud Service Providers Using Nessus
Tarlok Singh, Ajay Kumar
Unknown Journal
Published: Feb 2023
107 days after retraction
Key‐aggregate searchable encryption with multi‐user authorization and keyword untraceability for distributed IoT healthcare systems
Hiral S. Trivedi, Sankita J. Patel
Transactions on Emerging Telecommunications Technologies
Published: Jan 2023
4 citations
4 citations
79 days after retraction
Sec-Health: A Blockchain-Based Protocol for Securing Health Records
Leonardo da Costa, Billy Pinheiro, Weverton Cordeiro et al. (5 authors)
IEEE Access
Open Access
Published: Jan 2023
26 citations
26 citations
55 days after retraction
BLDSS: A Blockchain-Based Lightweight Searchable Data Sharing Scheme in Vehicular Social Networks
Yuanjian Zhou, Zhenfu Cao, Xiaolei Dong et al. (4 authors)
IEEE Internet of Things Journal
Published: Dec 2022
14 citations
14 citations
43 days after retraction
Privacy Preserving Encryption with Optimal Key Generation Technique on Deduplication for Cloud Computing Environment
Sanjeeva Polepaka, B Gayathri, Shahnawaz Ayoub et al. (6 authors)
2022 International Conference on Automation, Computing and Renewable Systems (ICACRS)
Published: Dec 2022
3 citations
3 citations
36 days after retraction
Cloud data security and various cryptographic algorithms
Yahia Alemami, Ali M. Al-Ghonmein, Khaldun G. Al-Moghrabi et al. (4 authors)
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering
Open Access
Published: Dec 2022
32 citations
32 citations
34 days after retraction
Real Time Efficient Block Level Dual Mode Data Deduplication Towards Mitigating Side Channel Attack in Cloud Storage
K. Jayashree, Narayana K.E
Research Square (Research Square)
Open Access
Published: Nov 2022
11 days after retraction
A survey on cryptographic techniques for protecting big data security: present and forthcoming
Siqi Lu, Jianhua Zheng, Zhenfu Cao et al. (5 authors)
Science China Information Sciences
Published: Sep 2022
17 citations
17 citations
45 days before retraction
Design of Interactive Teaching System of Physical Training Based on Artificial Intelligence
Min Xu, DongAo Liu, Yan Zhang
Journal of Information & Knowledge Management
Published: May 2022
17 citations
17 citations
170 days before retraction
Network security analysis for cloud computing environment
Linjiang Xie, Feilu Hang, Wei Guo et al. (5 authors)
Advances in Complex Systems
Published: Mar 2022
5 citations
5 citations
224 days before retraction
Privacy Preservation in Patient Information Exchange Systems Based on Blockchain: System Design Study
Sejong Lee, Jaehyeon Kim, Yongseok Kwon et al. (5 authors)
Journal of Medical Internet Research
Open Access
Published: Jan 2022
26 citations
26 citations
294 days before retraction
Biological Engineering Analysis of Vermicompost Based on Image Features and Machine Learning
Hongyan Wang, Ling Wang, Jiabin Liu et al. (5 authors)
Mobile Information Systems
Open Access
Published: Jan 2022
2 citations
2 citations
308 days before retraction
Blockchain meets healthcare: Architecture for secure data sharing in unobtrusive medical applications
M. Jayasudha, C. Vijayalakshmi
AIP conference proceedings
Published: Jan 2022
2 citations
2 citations
310 days before retraction
Research on Key Security Detection Method of Cross Domain Information Sharing Based on PKG Trust Gateway
RunQi Li
Journal of Interconnection Networks
Published: Dec 2021
2 citations
2 citations
314 days before retraction
Computer Network Communication Data Encryption System Based on Improved RSA Algorithm
Qijian Tang
Unknown Journal
Published: Dec 2021
1 citation
1 citation
318 days before retraction
Multicast Through Device to Device Communication Using Enhanced Diffie–Hellman Algorithm
M. Satish Kumar, D. P. Rao
Journal of Interconnection Networks
Published: Dec 2021
318 days before retraction
Enhancing the security of data in cloud computing environments using Remote Data Auditing
Muhammad Uzair Akmal, Binod Syangtan, Amr Alchouemi
Unknown Journal
Published: Nov 2021
1 citation
1 citation
348 days before retraction
WITHDRAWN: Mental health intervention for subthreshold depression in childhood experiences
Xiaoyang Wang, Xiaowen Zhu, Ching‐Hsien Hsu et al. (4 authors)
Aggression and Violent Behavior
Published: Nov 2021
1 citation
1 citation
371 days before retraction
Retracted: An enhance the data security performance using an optimal cloud network security for big data cloud framework
B. Venkatesan, S. Chitra
International Journal of Communication Systems
Published: Aug 2021
6 citations
6 citations
455 days before retraction
Securing IoT-based healthcare systems from counterfeit medicine penetration using Blockchain
A. Divya Preetha, T.S. Pradeep Kumar
Applied Nanoscience
Published: Aug 2021
16 citations
16 citations
460 days before retraction
Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques
Ahmad Ali AlZubi, Mohammed Al‐Maitah, Abdulaziz Alarifi
Soft Computing
Published: Jun 2021
83 citations
83 citations
499 days before retraction
ZASADY ODPOWIEDZIALNOŚCI PRAWNEJ TZW. SZTUCZNEJ INTELIGENCJI NA PODSTAWIE RZYMSKICH REGULACJI DOTYCZĄCYCH NIEWOLNIKÓW
Bartłomiej Oręziak
Zeszyty Prawnicze
Open Access
Published: Jun 2021
1 citation
1 citation
501 days before retraction
A privacy protection scheme for telemedicine diagnosis based on double blockchain
Wei Wang, Lianhai Wang, Peijun Zhang et al. (7 authors)
Journal of Information Security and Applications
Published: Jun 2021
30 citations
30 citations
510 days before retraction
Secure Distributed Medical Record Storage using Blockchain and Emergency Sharing Using Multi-Party Computation
Sudarshan Parthasarathy, Akash Harikrishnan, Gautam Narayanan et al. (5 authors)
Unknown Journal
Published: Apr 2021
19 citations
19 citations
567 days before retraction
Privacy Preservation in Patient Information Exchange Systems Based on Blockchain: System Design Study (Preprint)
Sejong Lee, Jaehyeon Kim, Yongseok Kwon et al. (5 authors)
Unknown Journal
Open Access
Published: Mar 2021
591 days before retraction
BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing
Yuting Zuo, Zhaozhe Kang, Jian Xu et al. (4 authors)
International Journal of Distributed Sensor Networks
Published: Mar 2021
35 citations
35 citations
616 days before retraction
Aggregation Encryption Method of Social Network Privacy Data Based on Matrix Decomposition Algorithm
Hongjing Bi
Wireless Personal Communications
Published: Feb 2021
2 citations
2 citations
623 days before retraction
Automatic Encryption Method of Sensor Network Capture Data Based on Symmetric Algorithm
Ming Li
Wireless Personal Communications
Published: Feb 2021
623 days before retraction
A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing
Shimao Yao, Ralph Voltaire J. Dayot, H. J. Kim et al. (4 authors)
IEEE Access
Open Access
Published: Jan 2021
23 citations
23 citations
675 days before retraction
An Approach to Securely Store Electronic Health Record(EHR) Using Blockchain with Proxy Re-Encryption and Behavioral Analysis
Kajal Kiran Dash, Biswojit Nayak, Bhabendu Kumar Mohanta
Advances in intelligent systems and computing
Published: Jan 2021
675 days before retraction
A Review of the State of the Art in Privacy and Security in the eHealth Cloud
Aqeel Sahi, David Lai, Yan Li
IEEE Access
Open Access
Published: Jan 2021
26 citations
26 citations
675 days before retraction
A Cloud-Assisted Proxy Re-Encryption Scheme for Efficient Data Sharing Across IoT Systems
V. Muthukumaran, D. Ezhilmaran
International Journal of Information Technology and Web Engineering
Published: Oct 2020
19 citations
19 citations
767 days before retraction
Proxy re‐encryption with equality test for secure data sharing in Internet of Things‐based healthcare systems
Wenchao Li, Chuanjie Jin, Saru Kumari et al. (5 authors)
Transactions on Emerging Telecommunications Technologies
Published: Jun 2020
25 citations
25 citations
865 days before retraction
Obstetric Imaging Diagnostic Platform Based on Cloud Computing Technology Under the Background of Smart Medical Big Data and Deep Learning
Weiwei Lie, Bin Jiang, Wenjing Zhao
IEEE Access
Open Access
Published: Jan 2020
36 citations
36 citations
1041 days before retraction
Analytics on real time security attacks in healthcare, retail and banking applications in the cloud
K. Padmaja, Ravi Seshadri
Evolutionary Intelligence
Published: Dec 2019
17 citations
17 citations
1055 days before retraction
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system
Yepeng Liu, Yongjun Ren, Chunpeng Ge et al. (5 authors)
Journal of Information Security and Applications
Published: May 2019
23 citations
23 citations
1277 days before retraction
Improving the Accuracy of Feature Selection in Big Data Mining Using Accelerated Flower Pollination (AFP) Algorithm
K. Venkatasalam, P. Rajendran, M. Thangavel
Journal of Medical Systems
Published: Mar 2019
10 citations
10 citations
1339 days before retraction
A Robust User Sentiment Biterm Topic Mixture Model Based on User Aggregation Strategy to Avoid Data Sparsity for Short Text
K. Nimala, R. Jebakumar
Journal of Medical Systems
Published: Mar 2019
17 citations
17 citations
1344 days before retraction
RETRACTED ARTICLE: Fuzzy rough subset method with region based mining to improve the retrieval and ranking of real time images over larger image database
K. Venkatasalam, P. Rjendran, M. Thangavel
Multimedia Tools and Applications
Published: Feb 2019
1356 days before retraction
Emerging Solutions in Big Data and Cloud Technologies for Mobile Networks
V. Vijayakumar, V. Neelanarayanan, Ron Doyle et al. (5 authors)
Mobile Networks and Applications
Open Access
Published: Feb 2019
5 citations
5 citations
1362 days before retraction
RETRACTED ARTICLE: A video analysis on user feedback based recommendation using A-FP hybrid algorithm
R. G. Sakthivelan, P. Rjendran, M. Thangavel
Multimedia Tools and Applications
Published: Feb 2019
4 citations
4 citations
1363 days before retraction
Archetype Development Process: A Case Study of Support Interoperability among Electronic Health Record in the State of Minas Gerais, Brazil
Thais Abreu Maia, Cristiana Fernandes De Müylder, Zilma Silveira Nogueira Reis
Journal of Medical Systems
Published: Jan 2019
2 citations
2 citations
1376 days before retraction
An efficient Elman neural network classifier with cloud supported internet of things structure for health monitoring system
Sivakumar Krishnan, S. Lokesh, M. Ramya Devi
Computer Networks
Published: Jan 2019
33 citations
33 citations
1377 days before retraction
Non-Linear Filtering Technique Used for Testing the Human Lumbar Spine FEA Model
E. Punarselvam, P. Suresh
Journal of Medical Systems
Published: Jan 2019
9 citations
9 citations
1401 days before retraction
Quick Stats
Total Citations:
51
Years Since Retraction:
3.0 years
Open Access:
Yes
Last Checked:
Jul 24, 2025