-
1
-
-
33744919262
-
Taiwan's perspective on electronic medical records' security and privacy protection: Lessons learned from HIPAA
-
DOI 10.1016/j.cmpb.2006.04.002, PII S0169260706000733
-
Yang, C. M., Lin, H. C., Chang, P., and Jian, W. S., Taiwan's perspective on electronic medical records' security and privacy protection: Lessons learned from HIPAA. Comput. Methods Programs Biol. 82(3):277-282, 2006. (Pubitemid 43850051)
-
(2006)
Computer Methods and Programs in Biomedicine
, vol.82
, Issue.3
, pp. 277-282
-
-
Yang, C.-M.1
Lin, H.-C.2
Chang, P.3
Jian, W.-S.4
-
2
-
-
39449106296
-
A cryptographic key management solution for HIPAA privacy/security regulations
-
Lee, W. B., and Lee, C. D., A cryptographic key management solution for HIPAA privacy/security regulations. IEEE Trans. Inf. Technol. Biomed. 12(1):34-41, 2008.
-
(2008)
IEEE Trans. Inf. Technol. Biomed.
, vol.12
, Issue.1
, pp. 34-41
-
-
Lee, W.B.1
Lee, C.D.2
-
3
-
-
25844502437
-
Technical guidelines for enhancing privacy and data protection in modern electronic medical environments
-
DOI 10.1109/TITB.2005.847498
-
Gritzalis, S., Lambrinoudakis, C., Lekkas, D., and Deftereos, S., Technical guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Trans. Inf. Technol. Biomed. 9(3):413-423, 2005. (Pubitemid 41388208)
-
(2005)
IEEE Transactions on Information Technology in Biomedicine
, vol.9
, Issue.3
, pp. 413-423
-
-
Gritzalis, S.1
Lambrinoudakis, C.2
Lekkas, D.3
Deftereos, S.4
-
4
-
-
0033790614
-
Managing medical and insurance information through a smart-card-based information system
-
Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213-234, 2000.
-
(2000)
J. Med. Syst.
, vol.24
, Issue.4
, pp. 213-234
-
-
Lambrinoudakis, C.1
Gritzalis, S.2
-
5
-
-
78651063942
-
Efficient nonce-based authentication scheme for session initiation protocol
-
Tsai, J. L., Efficient nonce-based authentication scheme for session initiation protocol. Int. J. Netw. Sec. 9(1):12-16, 2009.
-
(2009)
Int. J. Netw. Sec.
, vol.9
, Issue.1
, pp. 12-16
-
-
Tsai, J.L.1
-
6
-
-
9544232528
-
Improved remote authentication scheme with smart card
-
Lee, N. Y., and Chiu, Y. C., Improved remote authentication scheme with smart card. Comput. Stand. Interfaces 27(2):177-180, 2005.
-
(2005)
Comput. Stand. Interfaces
, vol.27
, Issue.2
, pp. 177-180
-
-
Lee, N.Y.1
Chiu, Y.C.2
-
7
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
DOI 10.1016/S0167-4048(02)00415-7
-
Chien, H.-Y., Jan, J.-K., and Tseng, Y.-M., An efficient and practical solution to remote authentication: Smart card. Comput. Secur. 21(4):372-375, 2002. (Pubitemid 34715241)
-
(2002)
Computers and Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.-Y.1
Jan, J.-K.2
Tseng, Y.-M.3
-
8
-
-
62349142332
-
Analysis of smart card-based remote user authentication schemes
-
Song, R., Korba, L., Yee, G., Analysis of smart card-based remote user authentication schemes. Proceedings of the 2007 International Conference on Security and Management, 323-329, 2007.
-
(2007)
Proceedings of the 2007 International Conference on Security and Management
, pp. 323-329
-
-
Song, R.1
Korba, L.2
Yee, G.3
-
9
-
-
62949130774
-
Two-factor user authentication in wireless sensor networks
-
Das, M. L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wireless Commun. 8(3):1086-1090, 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1086-1090
-
-
Das, M.L.1
-
10
-
-
33748126252
-
A password authentication scheme over insecure networks
-
Liao, E., Lee, C. C., and Hwang, M. S., A password authentication scheme over insecure networks. J. Comput. Syst. Sci. 72 (4):727-740, 2006.
-
(2006)
J. Comput. Syst. Sci.
, vol.72
, Issue.4
, pp. 727-740
-
-
Liao, E.1
Lee, C.C.2
Hwang, M.S.3
-
11
-
-
0017018484
-
New directions in cryptology
-
Diffie, W., and Hellman, M., New directions in cryptology. IEEE Trans. Inf. Theory 22(6):644-654, 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
12
-
-
24344457092
-
Secure authentication scheme for session initiation protocol
-
Yang, C. C., Wang, R. C., and Liu, W. T., Secure authentication scheme for session initiation protocol. Comput. Secur. 24:381-386, 2005.
-
(2005)
Comput. Secur.
, vol.24
, pp. 381-386
-
-
Yang, C.C.1
Wang, R.C.2
Liu, W.T.3
-
13
-
-
64249125305
-
An improved smart card based password authentication scheme with provable security
-
Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723-728, 2009.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.4
, pp. 723-728
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
14
-
-
44549086640
-
A new mutual authentication scheme based on nonce and smart cards
-
Liu, J. Y., Zhou, A. M., and Gao, M. X., A new mutual authentication scheme based on nonce and smart cards. Comput. Commun. 31(10):2205-2209, 2008.
-
(2008)
Comput. Commun.
, vol.31
, Issue.10
, pp. 2205-2209
-
-
Liu, J.Y.1
Zhou, A.M.2
Gao, M.X.3
-
15
-
-
0037507593
-
Smart cards for the people
-
(1)
-
Jones, D., Smart cards for the people. Card Technol. Today 15 (3):16-16(1), 2003.
-
(2003)
Card Technol. Today
, vol.15
, Issue.3
, pp. 16-16
-
-
Jones, D.1
-
16
-
-
63849310283
-
Group-based authentication to protect digital content for business applications
-
Chen, C.-L., Chen, Y.-Y., and Chen, Y.-H., Group-based authentication to protect digital content for business applications. Int. J. Innovative Comput. Inf. Control 5(5):1243-1251, 2009.
-
(2009)
Int. J. Innovative Comput. Inf. Control
, vol.5
, Issue.5
, pp. 1243-1251
-
-
Chen, C.-L.1
Chen, Y.-Y.2
Chen, Y.-H.3
-
17
-
-
77955208963
-
A novel authentication scheme for mobile commerce transactions
-
Lo, N. W., and Yeh, K.-H., A novel authentication scheme for mobile commerce transactions. Int. J. Innovative Comput. Inf. Control 6(7):3093-3103, 2010.
-
(2010)
Int. J. Innovative Comput. Inf. Control
, vol.6
, Issue.7
, pp. 3093-3103
-
-
Lo, N.W.1
Yeh, K.-H.2
-
18
-
-
33646849220
-
An efficient password authentication schemes without using the server public key for grid computing
-
Grid and Cooperative Computing - GCC 2005 - 4th International Conference, Proceedings
-
Yoon, E., and Yoo, K., An efficient password authentication schemes without using the server public key for grid computing. GCC 2005 LNCS 3795:149-154, 2005. (Pubitemid 43774698)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3795
, pp. 149-154
-
-
Yoon, E.-J.1
Yoo, K.-Y.2
-
20
-
-
0042834000
-
Security issues for implementation of e-medical records
-
DOI 10.1145/383694.383712
-
Huston, T., Security issues for implementation of E-medical records. Commun. ACM 44(9):89-94, 2001. (Pubitemid 33642863)
-
(2001)
Communications of the ACM
, vol.44
, Issue.9
, pp. 89-94
-
-
Huston, T.1
-
21
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T., A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory IT-31 (4):469-472, 1985.
-
(1985)
IEEE Trans. Inf. Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
El Gamal, T.1
|