A secure authentication scheme for telecare medicine information systems
ZY Wu, YC Lee, F Lai, HC Lee, Y Chung - Journal of medical systems, 2012 - Springer
The telecare medicine information system enables or supports health-care delivery services.
In recent years, the increased availability of lower-cost telecommunications systems and …
In recent years, the increased availability of lower-cost telecommunications systems and …
Long-term verifiability of the electronic healthcare records' authenticity
D Lekkas, D Gritzalis - International Journal of Medical Informatics, 2007 - Elsevier
PURPOSE: To investigate whether the long-term preservation of the authenticity of
electronic healthcare records (EHR) is possible. To propose a mechanism that enables the …
electronic healthcare records (EHR) is possible. To propose a mechanism that enables the …
Designing privacy-aware internet of things applications
Abstract Internet of Things (IoT) applications typically collect and analyse personal data that
can be used to derive sensitive information about individuals. However, thus far, privacy …
can be used to derive sensitive information about individuals. However, thus far, privacy …
[PDF][PDF] Amassing the security: An enhanced authentication and key agreement protocol for remote surgery in healthcare environment
The development of the Internet of Things has facilitated the rapid development of various
industries. With the improvement in people's living standards, people's health requirements …
industries. With the improvement in people's living standards, people's health requirements …
A privacy enhanced authentication scheme for telecare medical information systems
Q Jiang, J Ma, Z Ma, G Li - Journal of medical systems, 2013 - Springer
The telecare medical information system (TMIS) aims to establish telecare services and
enable the public to access medical services or medical information at remote sites …
enable the public to access medical services or medical information at remote sites …
A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme
Smart card-based remote authentication schemes are widely used in multi-medical-server-
based telecare medicine information systems (TMISs). Biometric is one of the most …
based telecare medicine information systems (TMISs). Biometric is one of the most …
Examining the intended and unintended consequences of organisational privacy safeguards
Research shows that despite organisational efforts to achieve privacy compliance, privacy
breaches continue to rise. The extant studies on organisational privacy compliance …
breaches continue to rise. The extant studies on organisational privacy compliance …
ITSSAKA-MS: An improved three-factor symmetric-key based secure AKA scheme for multi-server environments
A variety of three-factor smart-card based schemes, specifically designed for telecare
medicine information systems (TMIS) are available for remote user authentication. Most of …
medicine information systems (TMIS) are available for remote user authentication. Most of …
Research challenges and future directions towards medical data processing
A Ampavathi - Computer Methods in Biomechanics and Biomedical …, 2022 - Taylor & Francis
Data in the healthcare industry and machine learning techniques is useful to analyse a huge
amount of data to identify the hidden patterns in the disease, to give personalised treatment …
amount of data to identify the hidden patterns in the disease, to give personalised treatment …
Privacy preservation and information security protection for patients' portable electronic health records
LC Huang, HC Chu, CY Lien, CH Hsiao… - Computers in Biology and …, 2009 - Elsevier
As patients face the possibility of copying and keeping their electronic health records (EHRs)
through portable storage media, they will encounter new risks to the protection of their …
through portable storage media, they will encounter new risks to the protection of their …