A secure authentication scheme for telecare medicine information systems

ZY Wu, YC Lee, F Lai, HC Lee, Y Chung - Journal of medical systems, 2012 - Springer
The telecare medicine information system enables or supports health-care delivery services.
In recent years, the increased availability of lower-cost telecommunications systems and …

Long-term verifiability of the electronic healthcare records' authenticity

D Lekkas, D Gritzalis - International Journal of Medical Informatics, 2007 - Elsevier
PURPOSE: To investigate whether the long-term preservation of the authenticity of
electronic healthcare records (EHR) is possible. To propose a mechanism that enables the …

Designing privacy-aware internet of things applications

C Perera, M Barhamgi, AK Bandara, M Ajmal… - Information …, 2020 - Elsevier
Abstract Internet of Things (IoT) applications typically collect and analyse personal data that
can be used to derive sensitive information about individuals. However, thus far, privacy …

[PDF][PDF] Amassing the security: An enhanced authentication and key agreement protocol for remote surgery in healthcare environment

TY Wu, Q Meng, L Yang, S Kumari… - Comput. Model. Eng …, 2023 - cdn.techscience.cn
The development of the Internet of Things has facilitated the rapid development of various
industries. With the improvement in people's living standards, people's health requirements …

A privacy enhanced authentication scheme for telecare medical information systems

Q Jiang, J Ma, Z Ma, G Li - Journal of medical systems, 2013 - Springer
The telecare medical information system (TMIS) aims to establish telecare services and
enable the public to access medical services or medical information at remote sites …

A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme

S Barman, HPH Shum, S Chattopadhyay… - IEEE …, 2019 - ieeexplore.ieee.org
Smart card-based remote authentication schemes are widely used in multi-medical-server-
based telecare medicine information systems (TMISs). Biometric is one of the most …

Examining the intended and unintended consequences of organisational privacy safeguards

R Parks, H Xu, CH Chu, PB Lowry - European Journal of …, 2017 - Taylor & Francis
Research shows that despite organisational efforts to achieve privacy compliance, privacy
breaches continue to rise. The extant studies on organisational privacy compliance …

ITSSAKA-MS: An improved three-factor symmetric-key based secure AKA scheme for multi-server environments

Z Ali, S Hussain, RHU Rehman, A Munshi… - IEEE …, 2020 - ieeexplore.ieee.org
A variety of three-factor smart-card based schemes, specifically designed for telecare
medicine information systems (TMIS) are available for remote user authentication. Most of …

Research challenges and future directions towards medical data processing

A Ampavathi - Computer Methods in Biomechanics and Biomedical …, 2022 - Taylor & Francis
Data in the healthcare industry and machine learning techniques is useful to analyse a huge
amount of data to identify the hidden patterns in the disease, to give personalised treatment …

Privacy preservation and information security protection for patients' portable electronic health records

LC Huang, HC Chu, CY Lien, CH Hsiao… - Computers in Biology and …, 2009 - Elsevier
As patients face the possibility of copying and keeping their electronic health records (EHRs)
through portable storage media, they will encounter new risks to the protection of their …