메뉴 건너뛰기




Volumn 2012, Issue , 2012, Pages

Secure remote health monitoring with unreliable mobile devices

Author keywords

[No Author keywords available]

Indexed keywords

ACCURACY; ACTIMETRY; ARTICLE; CLINICAL PROTOCOL; COMPUTER PROGRAM; COMPUTER SECURITY; CONCEPTUAL FRAMEWORK; FEASIBILITY STUDY; HEALTH CARE SYSTEM; HEALTH PRACTITIONER; HUMAN; MOBILE PHONE; PATIENT MONITORING; QUALITY CONTROL; REMOTE SENSING; RISK ASSESSMENT; INSTRUMENTATION; PHYSIOLOGIC MONITORING; STANDARD; TELEMEDICINE;

EID: 84864952425     PISSN: 11107243     EISSN: 11107251     Source Type: Journal    
DOI: 10.1155/2012/546021     Document Type: Article
Times cited : (25)

References (20)
  • 1
    • 2942706124 scopus 로고    scopus 로고
    • Building the national health information infrastructure for personal health, health care services, public health, and research
    • Detmer D. E., Building the national health information infrastructure for personal health, health care services, public health, and research BMC Medical Informatics and Decision Making 2003 3, article 1
    • (2003) BMC Medical Informatics and Decision Making , vol.31
    • Detmer, D.E.1
  • 2
    • 84904385271 scopus 로고    scopus 로고
    • Remote medical monitoring
    • Jurik A. D., Weaver A. C., Remote medical monitoring Computer 2008 41 4 96 99
    • (2008) Computer , vol.41 , Issue.4 , pp. 96-99
    • Jurik, A.D.1    Weaver, A.C.2
  • 4
    • 33845642932 scopus 로고    scopus 로고
    • Pervasive health care applications face tough security challenges
    • Stanford V., Pervasive health care applications face tough security challenges IEEE Pervasive Computing 2002 1 2 8 12
    • (2002) IEEE Pervasive Computing , vol.1 , Issue.2 , pp. 8-12
    • Stanford, V.1
  • 6
    • 0002544658 scopus 로고    scopus 로고
    • Software security and privacy risks in mobile E- commerce
    • DOI 10.1145/359205.359227
    • Ghosh A. K., Swaminatha T. M., Software security and privacy risks in mobile e-commerce Communications of the ACM 2001 44 2 51 57 (Pubitemid 33631854)
    • (2001) Communications of the ACM , vol.44 , Issue.2 , pp. 51-57
    • Ghosh, A.K.1    Swaminatha, T.M.2
  • 7
    • 34248195511 scopus 로고    scopus 로고
    • The psychology of security
    • DOI 10.1145/1230819.1241693
    • Schneier B., The psychology of security Communications of the ACM 2007 50 5 128 (Pubitemid 46725670)
    • (2007) Communications of the ACM , vol.50 , Issue.5 , pp. 128
    • Schneier, B.1
  • 8
    • 84864939688 scopus 로고    scopus 로고
    • Mobile Phone Work Group Trusted Computing Group
    • Mobile Phone Work Group, Trusted Computing Group,. https://www. trustedcomputinggroup.org/groups/mobile
  • 9
    • 84864930766 scopus 로고    scopus 로고
    • Tcg Mobile Trusted Module Specification
    • TCG Mobile Trusted Module Specification, Revision 1. https://www. trustedcomputinggroup.org/specs/mobilephone/tcg-mobile-trustedmodule- 1.0.pdf
    • Revision 1
  • 10
    • 84864920947 scopus 로고    scopus 로고
    • Bioworks: A workflow system for automation of bioinformatics analysis processes
    • Han Y., Bioworks: a workflow system for automation of bioinformatics analysis processes International Journal of Bio-Science and Bio-Technology 2011 3 4 59 68
    • (2011) International Journal of Bio-Science and Bio-Technology , vol.3 , Issue.4 , pp. 59-68
    • Han, Y.1
  • 19
    • 33845395407 scopus 로고    scopus 로고
    • Side channel analysis for reverse engineering (SCARE)an improved attack against a secret A3/A8 GSM algorithm Cryptology ePrint Archive
    • 2004/049
    • Clavier C., Side channel analysis for reverse engineering (SCARE)an improved attack against a secret A3/A8 GSM algorithm Cryptology ePrint Archive Report 2004 2004/049
    • (2004) Report
    • Clavier, C.1
  • 20
    • 84864932198 scopus 로고    scopus 로고
    • Giesecke And Devrient Gmbh
    • Giesecke and devrient gmbh,. 2011, http://www.gi-de.com/
    • (2011)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.