메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1213-1218

A security framework for e-Health service authentication and e-Health data transmission

Author keywords

Access control; Authentication; e Health; Encryption; Role based access control

Indexed keywords

AUTHENTICATION TECHNIQUES; DATA TRANSMISSION; E-HEALTH SERVICES; EHEALTH; ENCRYPTION; ENCRYPTION ALGORITHMS; MEDICAL INFORMATION; MEDICAL TREATMENT; PRIVACY PROTECTION; PROTOCOL ARCHITECTURE; REDUCED COST; ROLE-BASED ACCESS CONTROL; SECURITY FRAMEWORKS; SECURITY REQUIREMENTS;

EID: 74549167195     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCIT.2009.5341116     Document Type: Conference Paper
Times cited : (29)

References (19)
  • 2
    • 0033120274 scopus 로고    scopus 로고
    • Security in Health-care Information Systems-current Trends
    • April
    • E. Smith, , J. Eloff, "Security in Health-care Information Systems-current Trends," International Journal of Medical Informatics, Vol. 54(1), pp.39-54, April 1999.
    • (1999) International Journal of Medical Informatics , vol.54 , Issue.1 , pp. 39-54
    • Smith, E.1    Eloff, J.2
  • 5
    • 74549127968 scopus 로고    scopus 로고
    • A Current Perspective on Encryption Algorithms
    • September, Available:, Accessed June 2009
    • L. Brown, "A Current Perspective on Encryption Algorithms," AUUG (Canberra) Summer Conference, September 1998. Available: http://www.unsw.adfa.edu.au/~lpb/papers/cauugs98/ [Accessed June 2009].
    • (1998) AUUG (Canberra) Summer Conference
    • Brown, L.1
  • 9
    • 74549219702 scopus 로고
    • Dr. Dobb's Journal, September, Available:, Accessed August 2009
    • B. Schneier, "The Blowfish Encryption Algorithm - One Year Later," Dr. Dobb's Journal, September 1995. Available: http://www.schneier. com/paper-blowfish-oneyear.html [Accessed August 2009].
    • (1995) The Blowfish Encryption Algorithm - One Year Later
    • Schneier, B.1
  • 13
    • 74549213551 scopus 로고    scopus 로고
    • Available:, Accessed August 2009
    • B. Schneiner, "Key Length and Security," 1999, Available: http://www.windowsecurity.com/uplarticle/4/keylength.txt [Accessed August 2009].
    • (1999) Key Length and Security
    • Schneiner, B.1
  • 15
    • 74549176902 scopus 로고    scopus 로고
    • April 25, 2005. Available:, Accessed August 2009
    • D. Bernstein, "Understanding brute force," April 25, 2005. Available: http://cr.yp.to/snuffle/bruteforce-20050425.pdf [Accessed August 2009].
    • Understanding brute force
    • Bernstein, D.1
  • 16
    • 74549130337 scopus 로고    scopus 로고
    • Available:, Accessed June 2009
    • Distributed.net. Available: http://distributed.net/ [Accessed June 2009]
  • 19
    • 84926191372 scopus 로고    scopus 로고
    • The Evolving Face of TeleMedicine & E-Health: Opening Doors and Closing Gaps in E-Health Services Opportunities & Challenges
    • January
    • J. Wen, J. Tan, "The Evolving Face of TeleMedicine & E-Health: Opening Doors and Closing Gaps in E-Health Services Opportunities & Challenges," Proc. of the 36th Annual Hawaii International Conference on System Sciences, Vol.6, pp. 172b, January 2003.
    • (2003) Proc. of the 36th Annual Hawaii International Conference on System Sciences , vol.6
    • Wen, J.1    Tan, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.