메뉴 건너뛰기




Volumn 6, Issue 6, 2010, Pages 954-958

Secure topology for electronic medical record transmissions

Author keywords

AES; Confidentiality; Electronic medical records; Non repudiation; Ntru; PKI

Indexed keywords


EID: 79957461639     PISSN: 18117775     EISSN: 18125700     Source Type: Journal    
DOI: 10.3923/ijp.2010.954.958     Document Type: Article
Times cited : (36)

References (32)
  • 3
    • 74349117323 scopus 로고    scopus 로고
    • A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
    • Ahmed, M.A., M.L.M. Kiah, B.B. Zaidan and A.A. Zaidan, 2010. A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm. J. Applied Sci., 10: 59-64.
    • (2010) J. Applied Sci , vol.10 , pp. 59-64
    • Ahmed, M.A.1    Kiah, M.L.M.2    Zaidan, B.B.3    Zaidan, A.A.4
  • 4
    • 78650590292 scopus 로고    scopus 로고
    • A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
    • Al-Bakri, S.H. and M.L.M. Kiah, 2010. A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael. Sci. Res. Essays
    • (2010) Sci. Res. Essays
    • Al-Bakri, S.H.1    Kiah, M.L.M.2
  • 6
    • 78951479954 scopus 로고    scopus 로고
    • Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study
    • Alam, G.M., M.L.M. Kiah, B.B. Zaidan, A.A. Zaidan and H.O. Alanazi, 2010. Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Sci. Res. Essays, 5: 3254-3260.
    • (2010) Sci. Res Essays , vol.5 , pp. 3254-3260
    • Alam, G.M.1    Kiah, M.L.M.2    Zaidan, B.B.3    Zaidan, A.A.4    Alanazi, H.O.5
  • 7
    • 78049468900 scopus 로고    scopus 로고
    • Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance
    • Alanazi, H.O., H.A. Jalab, G.M. Alam, B.B. Zaidan and A.A. Zaidan, 2010. Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. J. Med. Plants Res., 4: 2059-2074.
    • (2010) J. Med. Plants Res , vol.4 , pp. 2059-2074
    • Alanazi, H.O.1    Jalab, H.A.2    Alam, G.M.3    Zaidan, B.B.4    Zaidan, A.A.5
  • 8
    • 0036394536 scopus 로고    scopus 로고
    • Electronic signature for medical documents-integration and evaluation of a public key infrastructure in hospitals
    • Brandner, R., M. van der Haak, M. Hartmann, R. Haux and P. Schmucker, 2002. Electronic signature for medical documents-integration and evaluation of a public key infrastructure in hospitals. Methods Inform. Med., 41: 321-330.
    • (2002) Methods Inform Med , vol.41 , pp. 321-330
    • Brandner, R.1    van der Haak, M.2    Hartmann, M.3    Haux, R.4    Schmucker, P.5
  • 9
    • 0031987340 scopus 로고    scopus 로고
    • Security for the digital information age of medicine: Issues, applications and implementation
    • Epstein, M.A., M.S. Pasieka, W.P. Lord, S.T.C. Wong and N.J. Mankovich, 1998. Security for the digital information age of medicine: Issues, applications and implementation. J. Digit. Imag., 11: 33-44.
    • (1998) J. Digit. Imag , vol.11 , pp. 33-44
    • Epstein, M.A.1    Pasieka, M.S.2    Lord, W.P.3    Wong, S.T.C.4    Mankovich, N.J.5
  • 10
    • 78549271950 scopus 로고    scopus 로고
    • A new digital envelope approach for secure electronic medical records
    • Gobi, M. and K. Vivekanandan, 2009. A new digital envelope approach for secure electronic medical records. Int. J. Comput. Sci. Network Security, 9: 1-6.
    • (2009) Int. J. Comput. Sci. Network Security , vol.9 , pp. 1-6
    • Gobi, M.1    Vivekanandan, K.2
  • 11
    • 74349083769 scopus 로고    scopus 로고
    • An accurate method to obtain bio-metric measurements for three dimensional skull
    • Hameed, S.A., B.B. Zaidan, A.A. Zaidan, A.W. Naji and O.F. Tawfiq, 2010. An accurate method to obtain bio-metric measurements for three dimensional skull. J. Applied Sci., 10: 145-150.
    • (2010) J. Applied Sci , vol.10 , pp. 145-150
    • Hameed, S.A.1    Zaidan, B.B.2    Zaidan, A.A.3    Naji, A.W.4    Tawfiq, O.F.5
  • 12
    • 77954499630 scopus 로고    scopus 로고
    • Information and communication technology for participatory based decision-making-E-management for administrative efficiency in higher education
    • Hashim, F., G.M. Alam and S. Siraj, 2010. Information and communication technology for participatory based decision-making-E-management for administrative efficiency in higher education. Int. J. Phys. Sci., 5: 383-392.
    • (2010) Int. J. Phys. Sci , vol.5 , pp. 383-392
    • Hashim, F.1    Alam, G.M.2    Siraj, S.3
  • 13
    • 77954824252 scopus 로고    scopus 로고
    • On the Capacity and security of steganography approaches: An overview
    • Hmood, A.K., H.A. Jalab, Z.M. Kasirun, A.A. Zaidan and B.B. Zaidan, 2010a. On the Capacity and security of steganography approaches: An overview. J. Applied Sci., 10: 1825-1833.
    • (2010) J. Applied Sci , vol.10 , pp. 1825-1833
    • Hmood, A.K.1    Jalab, H.A.2    Kasirun, Z.M.3    Zaidan, A.A.4    Zaidan, B.B.5
  • 14
    • 77958064851 scopus 로고    scopus 로고
    • On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates
    • Hmood, A.K., Z.M. Kasirun, H.A. Jalab, G.M. Alam, A.A. Zaidan and B.B. Zaidan, 2010b. On the accuracy of hiding information metrics: Counterfeit protection for education and important certificates. Int. J. Phys. Sci., 5: 1054-1062.
    • (2010) Int. J. Phys. Sci , vol.5 , pp. 1054-1062
    • Hmood, A.K.1    Kasirun, Z.M.2    Jalab, H.A.3    Alam, G.M.4    Zaidan, A.A.5    Zaidan, B.B.6
  • 15
    • 77954829600 scopus 로고    scopus 로고
    • An overview on hiding information technique in images
    • Hmood, A.K., B.B. Zaidan, A.A. Zaidan and H.A. Jalab, 2010c. An overview on hiding information technique in images. J. Applied Sci., 10: 2094-2100.
    • (2010) J. Applied Sci , vol.10 , pp. 2094-2100
    • Hmood, A.K.1    Zaidan, B.B.2    Zaidan, A.A.3    Jalab, H.A.4
  • 16
    • 0035780544 scopus 로고    scopus 로고
    • Novel biometric digital signatures for Internet based applications
    • Janbandhu, P.K. and M.Y. Siyal, 2001. Novel biometric digital signatures for Internet based applications. Inform. Manage. Comput. Security, 9: 205-212.
    • (2001) Inform. Manage. Comput. Security , vol.9 , pp. 205-212
    • Janbandhu, P.K.1    Siyal, M.Y.2
  • 17
    • 56649102112 scopus 로고    scopus 로고
    • Revisiting Wiener's Attack-New Weak Keys in RSA
    • In: Information Security, Wu, T.C., C.L. Lei, V. Rijmen and D.T. Lee (Eds.), Springer-Verlag, Berlin, pp
    • Maitra, S. and S. Sarkar, 2008. Revisiting Wiener's Attack-New Weak Keys in RSA. In: Information Security, Wu, T.C., C.L. Lei, V. Rijmen and D.T. Lee (Eds.). LNCS. 5222, Springer-Verlag, Berlin, pp: 228-233.
    • (2008) LNCS , vol.5222 , pp. 228-233
    • Maitra, S.1    Sarkar, S.2
  • 18
    • 77952268534 scopus 로고    scopus 로고
    • Challenges of hidden data in the unused area two within executable files
    • Naji, A.W., A.A. Zaidan and B.B. Zaidan, 2009. Challenges of hidden data in the unused area two within executable files. J. Comput. Sci., 5: 890-897.
    • (2009) J. Comput. Sci , vol.5 , pp. 890-897
    • Naji, A.W.1    Zaidan, A.A.2    Zaidan, B.B.3
  • 19
    • 77955146619 scopus 로고    scopus 로고
    • A scalable and secure position-based routing protocol for ad-hoc networks
    • Qabajeh, L.K., M.L.M. Kiah and M.M. Qabajeh, 2009. A scalable and secure position-based routing protocol for ad-hoc networks. Malaysian J. Comput. Sci., 22: 99-120.
    • (2009) Malaysian J. Comput. Sci , vol.22 , pp. 99-120
    • Qabajeh, L.K.1    Kiah, M.L.M.2    Qabajeh, M.M.3
  • 20
    • 84857780686 scopus 로고    scopus 로고
    • Impact of spam advertisement through email: A study to assess the influence of the anti-spam on the email marketing
    • Raad, M., N.M. Yeasin, G.M. Alam, B.B. Zaidan and A.A. Zaidan, 2010. Impact of spam advertisement through email: A study to assess the influence of the anti-spam on the email marketing. Afr. J. Bus. Manage., 4: 2362-2367.
    • (2010) Afr. J. Bus. Manage , vol.4 , pp. 2362-2367
    • Raad, M.1    Yeasin, N.M.2    Alam, G.M.3    Zaidan, B.B.4    Zaidan, A.A.5
  • 22
    • 0033120274 scopus 로고    scopus 로고
    • Security in health-care information systems-current trends
    • Smith, E. and J.H.P. Eloff, 1999. Security in health-care information systems-current trends. Int. J. Med. Inform., 54: 39-54.
    • (1999) Int. J. Med. Inform , vol.54 , pp. 39-54
    • Smith, E.1    Eloff, J.H.P.2
  • 23
    • 78650269547 scopus 로고    scopus 로고
    • Shoulder surfing resistance using penup event and neighbouring connectivity manipulation
    • Yee, P.L. and M.L.M. Kiah, 2010. Shoulder surfing resistance using penup event and neighbouring connectivity manipulation. Malaysian J. Comput. Sci., 23: 121-140.
    • (2010) Malaysian J. Comput. Sci , vol.23 , pp. 121-140
    • Yee, P.L.1    Kiah, M.L.M.2
  • 24
    • 77954826595 scopus 로고    scopus 로고
    • Investigate the capability of applying hidden data in text file: An overview
    • Zaidan, A.A., B.B. Zaidan, A.K. Al-Fraja and H.A. Jalab, 2010a. Investigate the capability of applying hidden data in text file: An overview. J. Applied Sci., 10: 1916-1922.
    • (2010) J. Applied Sci , vol.10 , pp. 1916-1922
    • Zaidan, A.A.1    Zaidan, B.B.2    Al-Fraja, A.K.3    Jalab, H.A.4
  • 25
    • 77954833269 scopus 로고    scopus 로고
    • An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael
    • Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010b. An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael. J. Applied Sci., 10: 2161-2167.
    • (2010) J. Applied Sci , vol.10 , pp. 2161-2167
    • Zaidan, A.A.1    Zaidan, B.B.2    Al-Frajat, A.K.3    Jalab, H.A.4
  • 26
    • 77957325769 scopus 로고    scopus 로고
    • Novel approach for high (secure and rate) data hidden within triplex space for non multimedia file
    • Zaidan, A.A., B.B. Zaidan, H.O. Alanazi, A. Gani, O. Zakaria and G.M. Alam, 2010c. Novel approach for high (secure and rate) data hidden within triplex space for non multimedia file. Sci. Res. Essays, 5: 1965-1977.
    • (2010) Sci. Res. Essays , vol.5 , pp. 1965-1977
    • Zaidan, A.A.1    Zaidan, B.B.2    Alanazi, H.O.3    Gani, A.4    Zakaria, O.5    Alam, G.M.6
  • 27
    • 78649273195 scopus 로고    scopus 로고
    • Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem
    • Zaidan, A.A., B.B. Zaidan, A.Y. Taqa, K.M.S. Mustafa, G.M. Alam and H.A. Jalab, 2010d. Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem. Int. J. Phys. Sci., 5: 1992-2000.
    • (2010) Int. J. Phys. Sci , vol.5 , pp. 1992-2000
    • Zaidan, A.A.1    Zaidan, B.B.2    Taqa, A.Y.3    Mustafa, K.M.S.4    Alam, G.M.5    Jalab, H.A.6
  • 28
    • 77954783981 scopus 로고    scopus 로고
    • On the differences between hiding information and cryptography techniques: An overview
    • Zaidan, B.B., A.A. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010e. On the differences between hiding information and cryptography techniques: An overview. J. Applied Sci., 10: 1650-1655.
    • (2010) J. Applied Sci , vol.10 , pp. 1650-1655
    • Zaidan, B.B.1    Zaidan, A.A.2    Al-Frajat, A.K.3    Jalab, H.A.4
  • 29
    • 78649299082 scopus 로고    scopus 로고
    • StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem
    • Zaidan, B.B., A.A. Zaidan, A. Taqa, G.M. Alam, M.L.M. Kiah and H.A. Jalab, 2010f. StegoMos: A secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem. Int. J. Phys. Sci.,5: 1796-1806.
    • (2010) Int. J. Phys. Sci , vol.5 , pp. 1796-1806
    • Zaidan, B.B.1    Zaidan, A.A.2    Taqa, A.3    Alam, G.M.4    Kiah, M.L.M.5    Jalab, H.A.6
  • 30
    • 78651075908 scopus 로고    scopus 로고
    • A new hybrid module for skin detector using fuzzy inference system structure and explicit rules
    • In Press
    • Zaidan, A.A., H.A. Karim, N.N. Ahmed, G.M. Alam and B.B. Zaidan, 2010g. A new hybrid module for skin detector using fuzzy inference system structure and explicit rules. Int. J. Phys. Sci., (In Press).
    • (2010) Int. J. Phys. Sci
    • Zaidan, A.A.1    Karim, H.A.2    Ahmed, N.N.3    Alam, G.M.4    Zaidan, B.B.5
  • 31
    • 78649415172 scopus 로고    scopus 로고
    • Increase reliability for skin detector using backprobgation neural network and heuristic rules based on YcbCr
    • Zaidan, A.A., N.N. Ahmed, H.A. Karim, G.M. Alam and B.B. Zaidan, 2010h. Increase reliability for skin detector using backprobgation neural network and heuristic rules based on YcbCr. Sci. Res. Essays, 5: 2931-2946.
    • (2010) Sci. Res. Essays , vol.5 , pp. 2931-2946
    • Zaidan, A.A.1    Ahmed, N.N.2    Karim, H.A.3    Alam, G.M.4    Zaidan, B.B.5
  • 32
    • 78751500455 scopus 로고    scopus 로고
    • A novel hybrid module of skin detector using grouping histogram technique for bayesian method and segment skin adjacent-nested technique for neural network
    • In Press
    • Zaidan, A.A., H.A. Karim, N.N. Ahmed, G.M. Alam and B.B. Zaidan, 2010i. A novel hybrid module of skin detector using grouping histogram technique for bayesian method and segment skin adjacent-nested technique for neural network. Int. J. Phys. Sci., (In Press).
    • (2010) Int. J. Phys. Sci
    • Zaidan, A.A.1    Karim, H.A.2    Ahmed, N.N.3    Alam, G.M.4    Zaidan, B.B.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.