Security techniques for the electronic health records
CS Kruse, B Smith, H Vanderlinden… - Journal of medical …, 2017 - Springer
The privacy of patients and the security of their information is the most imperative barrier to
entry when considering the adoption of electronic health records in the healthcare industry …
entry when considering the adoption of electronic health records in the healthcare industry …
Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare
Internet of Things (IoT) produces massive heterogeneous data from various applications,
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …
A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems
M Masdari, S Ahmadzadeh - Journal of Network and Computer …, 2017 - Elsevier
Abstract A Telecare Medical Information System (TMIS) enables doctors and physicians at a
medical center to provide remote care via Internet to the registered patients at any place …
medical center to provide remote care via Internet to the registered patients at any place …
A lightweight and anonymous mutual authentication scheme for medical big data in distributed smart healthcare systems
S Das, S Namasudra - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
The rapid development of Big Data technology supports the advancement of many fields like
industrial automation, smart healthcare, distributed systems, and many more. Big data is …
industrial automation, smart healthcare, distributed systems, and many more. Big data is …
Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems
Many authentication schemes have been proposed for telecare medicine information
systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These …
systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These …
Privacy-preserving authentication and key-management protocol for health information systems
M Soni, DK Singh - Data Protection and Privacy in Healthcare, 2021 - taylorfrancis.com
This chapter provides a literature survey of existing authentication mechanisms for medical
applications. It presents a lightweight user verification and key-management protocol for …
applications. It presents a lightweight user verification and key-management protocol for …
A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems
Advancement in network technology provides new ways to utilize telecare medicine
information systems (TMIS) for patient care. Although TMIS usually faces various attacks as …
information systems (TMIS) for patient care. Although TMIS usually faces various attacks as …
A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
Connected health care has several applications including telecare medicine information
system, personally controlled health records system, and patient monitoring. In such …
system, personally controlled health records system, and patient monitoring. In such …
Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems
H Arshad, M Nikooghadam - Journal of medical systems, 2014 - Springer
Nowadays, with comprehensive employment of the internet, healthcare delivery services is
provided remotely by telecare medicine information systems (TMISs). A secure mechanism …
provided remotely by telecare medicine information systems (TMISs). A secure mechanism …
Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care
L Xu, F Wu - Journal of medical systems, 2015 - Springer
Nowadays, connected health care applications are used more and more in the world.
Service through the applications can save the patients' time and expense, such as telecare …
Service through the applications can save the patients' time and expense, such as telecare …