Security techniques for the electronic health records

CS Kruse, B Smith, H Vanderlinden… - Journal of medical …, 2017 - Springer
The privacy of patients and the security of their information is the most imperative barrier to
entry when considering the adoption of electronic health records in the healthcare industry …

Lightweight and anonymity-preserving user authentication scheme for IoT-based healthcare

M Masud, GS Gaba, K Choudhary… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) produces massive heterogeneous data from various applications,
including digital health, smart hospitals, automated pathology labs, and so forth. IoT sensor …

A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems

M Masdari, S Ahmadzadeh - Journal of Network and Computer …, 2017 - Elsevier
Abstract A Telecare Medical Information System (TMIS) enables doctors and physicians at a
medical center to provide remote care via Internet to the registered patients at any place …

A lightweight and anonymous mutual authentication scheme for medical big data in distributed smart healthcare systems

S Das, S Namasudra - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
The rapid development of Big Data technology supports the advancement of many fields like
industrial automation, smart healthcare, distributed systems, and many more. Big data is …

Security analysis of a chaotic map-based authentication scheme for telecare medicine information systems

WC Yau, RCW Phan - Journal of medical systems, 2013 - Springer
Many authentication schemes have been proposed for telecare medicine information
systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These …

Privacy-preserving authentication and key-management protocol for health information systems

M Soni, DK Singh - Data Protection and Privacy in Healthcare, 2021 - taylorfrancis.com
This chapter provides a literature survey of existing authentication mechanisms for medical
applications. It presents a lightweight user verification and key-management protocol for …

A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems

D Mishra, J Srinivas, S Mukhopadhyay - Journal of medical systems, 2014 - Springer
Advancement in network technology provides new ways to utilize telecare medicine
information systems (TMIS) for patient care. Although TMIS usually faces various attacks as …

A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care

AK Das, A Goswami - Journal of medical systems, 2013 - Springer
Connected health care has several applications including telecare medicine information
system, personally controlled health records system, and patient monitoring. In such …

Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems

H Arshad, M Nikooghadam - Journal of medical systems, 2014 - Springer
Nowadays, with comprehensive employment of the internet, healthcare delivery services is
provided remotely by telecare medicine information systems (TMISs). A secure mechanism …

Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care

L Xu, F Wu - Journal of medical systems, 2015 - Springer
Nowadays, connected health care applications are used more and more in the world.
Service through the applications can save the patients' time and expense, such as telecare …