Home health care vulnerability assessment using graph theory and matrix methods

H Barkaoui, A Guinet, T Wang - IFAC-PapersOnLine, 2017 - Elsevier
The accumulation of factors like climate variability, epidemics and the increasing mobility of
people around the world have increased the devastator impact of disasters. Furthermore …

Development of protection profile and security target for Indonesia electronic ID card's (KTP-el) card reader based on common criteria V3. 1: 2012/SNI ISO/IEC 15408 …

ME Aminanto, S Sutikno - 2014 International Conference of …, 2014 - ieeexplore.ieee.org
Indonesia electronic identity card (KTP-el) system consisting wireless smartcard, smartcard
reader and inhabitants database. Personal data of card holder are stored inside the card …

Fingerprint-based user authentication scheme for home healthcare system

Q Jin, W Jeon, C Lee, Y Choi… - 2013 Fifth International …, 2013 - ieeexplore.ieee.org
Home healthcare system is one of the most promising technologies from which more and
more people begin to benefit. Different from the traditional paper-based information record …

An improved anonymous electronic prescription scheme

C Chung, K Lee, J Yun, D Won - … , FGIT 2011 in Conjunction with GDC …, 2011 - Springer
The existing electronic prescription scheme fails to protect identities to mandates party or to
health insurance. To solve this problem, we propose RSA cryptosystem based anonymous …

A study on the secure home healthcare wireless service

C Lee, D Won, N Park - … : Third International Conference, FGIT 2011 in …, 2011 - Springer
Home healthcare has been developed to address personal healthcare issues and to make
use of advances in IT technology. Home healthcare users can check their physical …

[PDF][PDF] Wireless Networks and Security Algorithms for Efficient Data Encryption in Smart Healthcare

M Zayoud, S Oueida, S Kadry - Wireless Networks, 2018 - researchgate.net
Background: Wireless sensor networks are encompassed with diversity tools of information
technology which is widely applied in several domains including military surveillance …

[引用][C] Study on an Efficient User authentication scheme for home healthcare system

J Qiuyan