Home health care vulnerability assessment using graph theory and matrix methods
H Barkaoui, A Guinet, T Wang - IFAC-PapersOnLine, 2017 - Elsevier
The accumulation of factors like climate variability, epidemics and the increasing mobility of
people around the world have increased the devastator impact of disasters. Furthermore …
people around the world have increased the devastator impact of disasters. Furthermore …
Development of protection profile and security target for Indonesia electronic ID card's (KTP-el) card reader based on common criteria V3. 1: 2012/SNI ISO/IEC 15408 …
ME Aminanto, S Sutikno - 2014 International Conference of …, 2014 - ieeexplore.ieee.org
Indonesia electronic identity card (KTP-el) system consisting wireless smartcard, smartcard
reader and inhabitants database. Personal data of card holder are stored inside the card …
reader and inhabitants database. Personal data of card holder are stored inside the card …
Fingerprint-based user authentication scheme for home healthcare system
Q Jin, W Jeon, C Lee, Y Choi… - 2013 Fifth International …, 2013 - ieeexplore.ieee.org
Home healthcare system is one of the most promising technologies from which more and
more people begin to benefit. Different from the traditional paper-based information record …
more people begin to benefit. Different from the traditional paper-based information record …
An improved anonymous electronic prescription scheme
The existing electronic prescription scheme fails to protect identities to mandates party or to
health insurance. To solve this problem, we propose RSA cryptosystem based anonymous …
health insurance. To solve this problem, we propose RSA cryptosystem based anonymous …
A study on the secure home healthcare wireless service
Home healthcare has been developed to address personal healthcare issues and to make
use of advances in IT technology. Home healthcare users can check their physical …
use of advances in IT technology. Home healthcare users can check their physical …
[PDF][PDF] Wireless Networks and Security Algorithms for Efficient Data Encryption in Smart Healthcare
Background: Wireless sensor networks are encompassed with diversity tools of information
technology which is widely applied in several domains including military surveillance …
technology which is widely applied in several domains including military surveillance …