{"id":"https://openalex.org/W3161667159","doi":"https://doi.org/10.1145/3459601","title":"Introduction to the Special Issue on Recent Trends in Medical Data Security for e-Health Applications","display_name":"Introduction to the Special Issue on Recent Trends in Medical Data Security for e-Health Applications","publication_year":2021,"publication_date":"2021-05-18","ids":{"openalex":"https://openalex.org/W3161667159","doi":"https://doi.org/10.1145/3459601","mag":"3161667159"},"language":"en","primary_location":{"id":"doi:10.1145/3459601","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3459601","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100634925","display_name":"Amit Kumar Singh","orcid":"https://orcid.org/0000-0001-7359-2068"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Amit Kumar Singh","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108044017","display_name":"Zhihan Lv","orcid":"https://orcid.org/0009-0005-9452-5768"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhihan Lv","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021585332","display_name":"Hoon Ko","orcid":"https://orcid.org/0000-0002-4604-1735"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hoon Ko","raw_affiliation_strings":[""],"affiliations":[{"raw_affiliation_string":"","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100634925"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.6675,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.93114983,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":100},"biblio":{"volume":"17","issue":"2s","first_page":"1","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.8817999958992004,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.8817999958992004,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.7803000211715698,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.7785000205039978,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/citation","display_name":"Citation","score":0.7746018171310425},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.596792995929718},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.48670151829719543},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.43543845415115356},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.39236730337142944}],"concepts":[{"id":"https://openalex.org/C2778805511","wikidata":"https://www.wikidata.org/wiki/Q1713","display_name":"Citation","level":2,"score":0.7746018171310425},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.596792995929718},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.48670151829719543},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.43543845415115356},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.39236730337142944}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3459601","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3459601","pdf_url":null,"source":{"id":"https://openalex.org/S19610489","display_name":"ACM Transactions on Multimedia Computing Communications and Applications","issn_l":"1551-6857","issn":["1551-6857","1551-6865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Multimedia Computing, Communications, and Applications","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655","https://openalex.org/W2359140296"],"abstract_inverted_index":{"introduction":[0],"Share":[1],"on":[2,8,46,103],"Introduction":[3],"to":[4,114,118,120],"the":[5,104],"Special":[6],"Issue":[7],"Recent":[9],"Trends":[10],"in":[11,113],"Medical":[12],"Data":[13],"Security":[14],"for":[15],"e-Health":[16],"Applications":[17],"Editors:":[18],"Amit":[19],"Kumar":[20],"Singh":[21],"Search":[22,29,36],"about":[23,30,37],"this":[24,31,38],"author":[25,32,39],",":[26,33],"Zhihan":[27],"Lv":[28],"Hoon":[34],"Ko":[35],"Authors":[40],"Info":[41],"&":[42],"Claims":[43],"ACM":[44],"Transactions":[45],"Multimedia":[47],"Computing,":[48],"Communications,":[49],"and":[50,80],"ApplicationsVolume":[51],"17Issue":[52],"2sJune":[53],"2021":[54],"Article":[55],"No.:":[56],"58pp":[57],"1\u20133https://doi.org/10.1145/3459601Published:18":[58],"May":[59],"2021Publication":[60],"History":[61],"6citation187DownloadsMetricsTotal":[62],"Citations6Total":[63],"Downloads187Last":[64],"12":[65],"Months106Last":[66],"6":[67],"weeks24":[68],"Get":[69],"Citation":[70,72,110],"AlertsNew":[71],"Alert":[73],"added!This":[74],"alert":[75,100],"has":[76,95],"been":[77,96],"successfully":[78],"added":[79],"will":[81,85],"be":[82,86],"sent":[83],"to:You":[84],"notified":[87],"whenever":[88],"a":[89,122],"record":[90],"that":[91],"you":[92],"have":[93],"chosen":[94],"cited.To":[97],"manage":[98],"your":[99,115],"preferences,":[101],"click":[102],"button":[105],"below.Manage":[106],"my":[107],"Alerts":[108],"New":[109,123],"Alert!Please":[111],"log":[112],"account":[116],"Save":[117],"BinderSave":[119],"BinderCreate":[121],"BinderNameCancelCreateExport":[124],"CitationPublisher":[125],"SiteGet":[126],"Access":[127]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":19},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
