Chen et al., 2019 - Google Patents
Study of out-of-hospital access to HIS system: a security perspectiveChen et al., 2019
View HTML- Document ID
- 11671672010490434874
- Author
- Chen C
- Hsu Y
- Lin C
- Hajiyev J
- Su C
- Tseng C
- Publication year
- Publication venue
- Sensors
External Links
Snippet
In light of the need for Extramural Hospital Information System (HIS) access through mobile devices outside the hospital, this research analyzes situational information security threats, including the circumstances in which a mobile device may get lost and personal data may …
- 238000005516 engineering process 0 abstract description 41
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Al Hwaitat et al. | A new blockchain-based authentication framework for secure IoT networks | |
Deep et al. | Authentication protocol for cloud databases using blockchain mechanism | |
Chen et al. | LAP-IoHT: A lightweight authentication protocol for the internet of health things | |
Ali et al. | A secure and efficient multi-factor authentication algorithm for mobile money applications | |
Ahmad et al. | BAuth-ZKP—A blockchain-based multi-factor authentication mechanism for securing smart cities | |
Otta et al. | A systematic survey of multi-factor authentication for cloud infrastructure | |
Jung et al. | An anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in wireless sensor networks | |
Chen et al. | A blockchain-based secure inter-hospital EMR sharing system | |
Sharif et al. | The eIDAS regulation: a survey of technological trends for European electronic identity schemes | |
Lin et al. | A smartcard-based user-controlled single sign-on for privacy preservation in 5G-IoT telemedicine systems | |
Wu et al. | Enhancing the security: A lightweight authentication and key agreement protocol for smart medical services in the ioht | |
Ryu et al. | A secure and lightweight three-factor-based authentication scheme for smart healthcare systems | |
Zukarnain et al. | Authentication securing methods for mobile identity: Issues, solutions and challenges | |
Thammarat | Efficient and secure NFC authentication for mobile payment ensuring fair exchange protocol | |
Thakare et al. | Secure and efficient authentication scheme in IoT environments | |
Almuhaideb et al. | A lightweight three-factor authentication scheme for WHSN architecture | |
Mohammed et al. | Efficient and flexible multi-factor authentication protocol based on fuzzy extractor of administrator’s fingerprint and smart mobile device | |
Lee et al. | Compliance with HIPAA and GDPR in certificateless-based authenticated key agreement using extended chaotic maps | |
Khan et al. | Enhancing security and privacy in healthcare systems using a lightweight RFID protocol | |
Khalid et al. | Cross-SN: a lightweight authentication scheme for a multi-server platform using IoT-based wireless medical sensor network | |
Choi et al. | Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things | |
Abuarqoub | D-FAP: Dual-factor authentication protocol for mobile cloud connected devices | |
El-Meniawy et al. | An authentication protocol for the medical internet of things | |
Oduguwa et al. | Passwordless Authentication Using a Combination of Cryptography, Steganography, and Biometrics | |
Zhang et al. | An improved protocol for the password authenticated association of IEEE 802.15. 6 standard that alleviates computational burden on the node |