参考文献/References:
[1] 庞辉,梁伟,杜剑亮,等.美国医院电子医疗记录低应用率给中国医院电子医疗记录发展的启示 [J].中国病案,2013,(10):11-13.
[2] Sweeney L.K-anonymity:a model for protecting privacy [J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570.
[3] Machanavajjhala A,Kifer D,Gehrke J,et al.l-diversity:privacy beyond k-anonymity [J].ACM Transactions on Knowledge Discovery from Data(TKDD),2007,1(1):3.
[4] Li Nihui,Li Tiangcheng,Venkatasubramanian S.t-closeness:Privacy beyond k-anonymity and l-diversity [C].IEEE 23rd International Conference on IEEE,2007:106-115.
[5] De Montjoye Y A,Hidalgo C A,Verleysen M,et al.Unique in the crowd:the privacy bounds of human mobility [J].Scientific Reports,2013,3:1376.
[6] Narayanan A,Shmatikov V.How to break anonymity of the netflix prize dataset [EB/OL].
[2017-01-13].http://smanticscholar.org/5611/6e8ce3f57bec578ac60f6d68333aea5af59e.pdf
[7] Dwork C.Differential privacy [M]us:Springer,2011:338-340.
[8] Gentry C.Fully homomorphic encryption using ideal lattices [J]Acm sysmpoium on computing,2009,9(4):169-178.
[9] Xhafa F,Li Jingwei,Zhao Gansen,et al.Designing cloud-based electronic health record system with attribute-based encryption [J].Multimedia Tools and Applications,2015,74(10):3441.
[10]Zyskind G,Nathan O.Decentralizing privacy:using blockchain to protect personal data [C].Security and Privacy Workshops(SPW),IEEE,2015:180-184.
[11] Karame G O,Androulaki E,Capkun S.Double-spending fast payments in bitcoin [C].Proceedings of the 2012 ACM conference on Computer and communications security,2012:906-917.
[12] Antonopoulos A M.Mastering Bitcoin:unlocking digital cryptocurrencies [M].Sebastopol O’Reilly Media,Inc,2014.
[13] Christidis K,Devetsikiotis M.Blockchains and smart contracts for the Internet of Things [J].IEEE Access,2016,4:2292-2303.
[14] Greenspan G.Ending the bitcoin vs blockchain debate [J].MultiChain blog URL:http://www.multichain.com/blog/2015/07/bitcoin-vs-blockchain-debate,2015.
[15] Douceur J R.The sybil attack [C].Berlin:Springer Berlin Heidelberg,2002:251-260.
[16] Roe M.Performance of block ciphers and hash functions-one year later [C].Berlin:Springer Berlin Heidelberg,1994:359-362.