Enhancing security of electronic health records through grid-based user authentication scheme
暂无分享,去创建一个
[1] Snezana Sucurovic. An Approach to Access Control in Electronic Health Record , 2009, Journal of Medical Systems.
[2] Rajkumar Buyya,et al. GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for Grid computing , 2002, Concurr. Comput. Pract. Exp..
[3] José Luis Fernández Alemán,et al. Security and privacy in electronic health records: A systematic literature review , 2013, J. Biomed. Informatics.
[4] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[5] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[6] Phillip Rogaway,et al. Nonce-Based Symmetric Encryption , 2004, FSE.
[7] Maryam Ahmadi,et al. Security Requirements and Solutions in Electronic Health Records: Lessons Learned from a Comparative Study , 2010, Journal of Medical Systems.
[8] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[9] Loris Nanni,et al. Multihashing, human authentication featuring biometrics data and tokenized random number: A case study FVC2004 , 2005, Neurocomputing.
[10] Mark A. Rothstein,et al. Compelled Authorizations for Disclosure of Health Records: Magnitude and Implications , 2007, The American journal of bioethics : AJOB.
[11] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[12] David-Olivier Jaquet-Chiffelle,et al. Medical record search engines, using pseudonymised patient identity: An alternative to centralised medical records , 2011, Int. J. Medical Informatics.
[13] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[14] Sun K. Yoo,et al. Web-based secure access from multiple patient repositories , 2008, Int. J. Medical Informatics.
[15] Mario Piattini,et al. Security requirements engineering framework for software product lines , 2010, Inf. Softw. Technol..
[16] Padma Ramachandran,et al. Education in India , 2006 .
[17] Conor Teljeur,et al. Exploring the potential for using the grid to support health impact assessment modelling , 2004, Parallel Comput..
[18] Leslie Lenert,et al. A Public Health Grid (PHGrid): Architecture and value proposition for 21st century public health , 2010, Int. J. Medical Informatics.
[19] Timothy B. Stockwell,et al. The Sequence of the Human Genome , 2001, Science.
[20] Yuguang Fang,et al. Cross-Domain Data Sharing in Distributed Electronic Health Record Systems , 2010, IEEE Transactions on Parallel and Distributed Systems.
[21] Reihaneh Safavi-Naini,et al. Using digital rights management for securing data in a medical research environment , 2010, DRM '10.
[22] Jiankun Hu,et al. Corresponding author’s address: , 2022 .
[23] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[24] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..