721 Hits in 6.5 sec

Healthcare information systems using digital signature and synchronized smart cards via the Internet

Won Jay Song, Byung Ha Ahn, Won Hee Kim
Proceedings. International Conference on Information Technology: Coding and Computing  
The digital signatures written by the medical professionals (doctors and pharmacists) holding and using their individually master smart cards are applied to all contents of the prescription stored on a  ...  Therefore, digital signatures for all prescriptions stored on the smart card should effectively be used to prevent being altered, forged, and reused by unauthorized users and being repudiated by medical  ...  smart cards in the 2-way type terminal under the synchronized status to the currently existing healthcare information systems.  ... 
doi:10.1109/itcc.2002.1000383 dblp:conf/itcc/SongAK02 fatcat:3zfrclazb5gmbijlnog5z42q3y

An eHealth platform for instant interaction among health professionals

C.E. Chronaki, F. Chiarugi, E. Mavrogiannaki, C. Demou, P. Lelis, D. Trypakis, M. Spanakis, M. Tsiknakis, S.C. Orphanoudakis
2003 Computers in Cardiology, 2003  
objects using smart cards, and the use of Object Management Group's (OMG) person identification service (PIDS) to interoperate with clinical information systems.  ...  In an age where medical collaboration is the key to effective healthcare delivery and continuity of care, the location of experts and the management of their time are affecting the wide deployment of eHealth  ...  The GP reviews the consultation request maybe including additional information and digitally signs the document using a personal smart card.  ... 
doi:10.1109/cic.2003.1291100 fatcat:enc5djtfnvh2dbtdy6kkd2sxem

Management patients information based finger print

Ahmed Bashar Fakhri, Huda Farooq Jameel, Mustafa Falah Mahmood
2022 Indonesian Journal of Electrical Engineering and Computer Science  
The suggested technology allows the use of a micro-SD card to store patient information as well as send it by internet.  ...  The system consists of an Arduino UNO board, a fingerprint sensor, an secure digital (SD) card module, and a micro-SD card.  ...  ACKNOWLEDGEMENTS The authors are thankful to the Electrical Engineering Technical College at Middle Technical University in Baghdad, Iraq, for supporting them with the investigations.  ... 
doi:10.11591/ijeecs.v26.i3.pp1281-1289 fatcat:fbxyhkbvrzb2njhvlbrkhx4cmy

SCB-HC-ECC–Based Privacy Safeguard Protocol for Secure Cloud Storage of Smart Card–Based Health Care System

Sudha Senthilkumar, K. Brindha, Natalia Kryvinska, Sweta Bhattacharya, Giridhar Reddy Bojja
2021 Frontiers in Public Health  
servers via smart health card solution providers.  ...  The advent of the internet has brought an era of unprecedented connectivity between networked devices, making one distributed computing, called cloud computing, and popular.  ...  Mutual authentication between the healthcare organization that accesses the patient data using a smart card via the smart health card solution provider to the cloud server for further treatment. 3.  ... 
doi:10.3389/fpubh.2021.688399 pmid:34660507 pmcid:PMC8516396 fatcat:kf2dwvj72vdptnrkkapotwdhda

A Security Reference Model for the Construction of Mobile Banking Services based on Smart Phones

Yong-Nyuo Shin, Woo-Chang Shin
2011 International Journal of Fuzzy Logic and Intelligent Systems  
The proposed mobile banking security reference model is useful in improving system security by systematically analyzing information security threats to the mobile financial service, and by presenting the  ...  As the mobile technology of smart phones has become associated with all areas of industry, it is not only accelerating innovation in other industries such as shopping, healthcare service, education, and  ...  Process key generation and digital signature generation inside of the USIM card, when encryption operation is performed. C11.  ... 
doi:10.5391/ijfis.2011.11.4.229 fatcat:hopzaiacfjgifmmqsydafmafbq

Privacy Enhanced Healthcare Information Sharing System for Home-Based Care Environments

Daniel Agbesi Dzissah, Joong-Sun Lee, Hiroyuki Suzuki, Mie Nakamura, Takashi Obi
2019 Healthcare Informatics Research  
Both PKI mechanisms are provided by using separate smart cards issued by the government. Context-awareness enables users to have appropriate data access in home-based nursing environments.  ...  The proposed method aims to enhance healthcare data access and secure information delivery to preserve user's privacy.  ...  The Japanese Public Key (JPKI) in the 'My Number Card' is used to verify the card owner's identity on the internet.  ... 
doi:10.4258/hir.2019.25.2.106 pmid:31131145 pmcid:PMC6517627 fatcat:f4yjcn7yabahpimmt5djjyjrce

Integration of Patient Health Portals into the German Healthcare Telematics Infrastructure

Sebastian Dünnebeil, Ali Sunyaev, Christian Mauro, Jan Marco Leimeister, Helmut Krcmar
2009 Americas Conference on Information Systems  
We aim at providing patients an application platform model for using and enhancing their data by processing or extending them with medical services offered via the internet or with local medical appliances  ...  suited to provide a link between the public health information infrastructure and other (maybe commercial) applications in the e-health environment via Personal Health Records (PHR) and c) patients' rights  ...  All primary systems using the telematics at the medical sites will have dedicated patient front-ends, implemented via a separate trusted viewer and a card reader.  ... 
dblp:conf/amcis/DunnebeilSMLK09 fatcat:crnahffacrff3o3fgqbwmhhvdq

Electronic health system: Development and implementation into the health system of the Republic of Serbia

Dejan Milenkovic, Marina Jovanovic-Milenkovic, Vladimir Vujin, Aca Aleksic, Zoran Radojicic
2012 Vojnosanitetski Pregled  
Key words: delivery of health care; health services; healthcare institutions; medical informatics applications; serbia.  ...  The security mechanisms in electronic health system are 5 : authentication, which makes it possible to reliably identify a user via electronic smart card; use of digital signature; protection of confidential  ...  access the card, cryptographic keys for mutual authentication between the card and smart card reader, asymmetric keys to perform digital signature 10 .  ... 
doi:10.2298/vsp101125021m pmid:23155610 fatcat:3fxet5jybfgzhbxyyvhn7ehhdq

New model of Electronic Health Record: Macedonian case study

Goce Gavrilov, Vladimir Trajkovik
2016 Journal of Emerging research and solutions in ICT  
the Macedonian healthcare information system.  ...  Electronic Health Record (EHR) systems are core applications in any e-Health environment and represent basic services for healthcare information technology platforms.  ...  Our model of EHR offers the possibility of using digital certificates stored on smart cards, tokens or integration with server-based systems for digital signing.  ... 
doi:10.20544/ersict.02.16.p08 fatcat:wxqyupizqre5vnetgwesjnsba4

D-commerce- A way for Business

Prof. Dr. V. D. Nandavadekar, Mrs. A. R. Wafgaonkar, Dr P V Kulkarni
2010 International Journal of Computer Applications  
of Credit Card -Online credit card is much similar to actual card being used no card impression is taken and no signature is available.  ...  Table no . no 5 gives detail online stored value system and use of cards. 4.4 Smart Cards as Stored Value System -are another kind of stored value system based on credit cards that have embedded chips  ... 
doi:10.5120/222-372 fatcat:hoa5hq7f4zbfjejathw42rgqt4

Cryptographic ledger of blockchain technology in healthcare

Diba Chowdhury, Laila Tamanna Anni, Md. Mahmudul Hasan, Nayeem Al-Tamzid Bhuiyan, Nafiul Islam, Rahat Pervez
2021 GSC Advanced Research and Reviews  
The big achievement of this technology there is no need for any third party and user can control their personal data.  ...  This technology offers encrypted data, integrated data, drug traceability, interoperability and most important thing it gives security regarding patients' data misuse, drug counterfeit.  ...  and supervised them throughout the process.  ... 
doi:10.30574/gscarr.2021.7.3.0117 fatcat:oifipwqtoffjvk6el7mbcavhku

Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues

Norah Alsaeed, Farrukh Nadeem
2022 Applied Sciences  
The Internet of Medical Things (IoMT) has revolutionized the world of healthcare by remotely connecting patients to healthcare providers through medical devices connected over the Internet.  ...  We observed that most of the authentication schemes use a distributed architecture and public key infrastructure.  ...  Therefore, the authors gratefully acknowledge technical and financial support from Ministry of Education and Deanship of Scientific Research (DSR), King Abdulaziz University (KAU), Jeddah, Saudi Arabia  ... 
doi:10.3390/app12157487 fatcat:bormi2zu3ferdcipjanhcydk7m

LAP-IoHT: A Lightweight Authentication Protocol for the Internet of Health Things

Chien-Ming Chen, Zhaoting Chen, Saru Kumari, Meng-Chang Lin
2022 Sensors  
The Internet of Health Things (IoHT), which is an extension of the Internet of Things (IoT) in healthcare, has provided a new type of telemedicine approach.  ...  In IoHT, wearable sensors are used to collect patient health data, and information is transmitted remotely to doctors who can develop accurate treatment plans and provide timely telemedicine services to  ...  Sections 4 and 5 provide the security analysis and performance evaluation, respectively. Finally, Section 6 concludes the paper.  ... 
doi:10.3390/s22145401 pmid:35891080 pmcid:PMC9320153 fatcat:hyu6qbuq2vbelgogvop7vcxyzy

Efficient Joint Key Authentication Model in E-Healthcare

Muhammad Sajjad, Tauqeer Safdar Malik, Shahzada Khurram, Akber Abid Gardezi, Fawaz Alassery, Habib Hamam, Omar Cheikhrouhou, Muhammad Shafiq
2022 Computers Materials & Continua  
These devices and mobile applications are now increasingly used and integrated through the medical Internet of Things (mIoT). mIoT is an important part of the digital transformation of healthcare, because  ...  We use the AVISPA tool to verify through the wellknown HLPSL specification language to develop user authentication and smart card use cases in a user-friendly environment.  ...  Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.  ... 
doi:10.32604/cmc.2022.022706 fatcat:gd7a4rcxw5gc3k5u3h5nendq6i

Blockchain For Better Care [article]

David Manset, Edwin Morley-Fletcher
2017 Zenodo  
A white paper dedicated to blockchain and its potential application in healthcare.  ...  In particular, for healthcare professionals, the Shared Information Systems Agency (ASIP) recommends the use of Health Professional Cards (CPS) or another strong authentication mechanism such as an SMS  ...  As foundational pillars of our governing system, the healthcare and insurance sectors are moving from siloed, slow-changing monopolistic and yet complex information systems, to decoupled, rapidly growing  ... 
doi:10.5281/zenodo.1065362 fatcat:mjenfdolk5brxpy4idwrbqlpvy
« Previous Showing results 1 — 15 out of 721 results