메뉴 건너뛰기




Volumn 37, Issue 2, 2013, Pages

A reliable RFID mutual authentication scheme for healthcare environments

Author keywords

Authentication scheme; Healthcare environment; Patient privacy; Radio frequency identification

Indexed keywords

ARTICLE; CLINICAL EFFECTIVENESS; COMPUTER SECURITY; MUTUAL AUTHENTICATION SCHEME; NEWBORN CARE; PRIVACY; PROCESS DESIGN; RADIOFREQUENCY IDENTIFICATION; RELIABILITY; ALGORITHM; CONFIDENTIALITY; HEALTH CARE FACILITY; INFORMATION SYSTEM; RADIO FREQUENCY IDENTIFICATION DEVICE; STANDARDS;

EID: 84872108027     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-012-9917-0     Document Type: Article
Times cited : (24)

References (31)
  • 2
    • 79953096361 scopus 로고    scopus 로고
    • Privacy and security requirements for RFID applications
    • Hwang, M. S., Wei, C. H., and Lee, C. Y., Privacy and security requirements for RFID applications. J. Comput. 20(3):55-60, 2009.
    • (2009) J. Comput. , vol.20 , Issue.3 , pp. 55-60
    • Hwang, M.S.1    Wei, C.H.2    Lee, C.Y.3
  • 3
    • 79952440568 scopus 로고    scopus 로고
    • Real-time location and inpatient care systems based on passive RFID
    • 10.1016/j.jnca.2010.04.011
    • Najera, P., Lopez, J., and Roman, R., Real-time location and inpatient care systems based on passive RFID. J. Netw. Comput. Appl. 34(3):980-989, 2011.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.3 , pp. 980-989
    • Najera, P.1    Lopez, J.2    Roman, R.3
  • 5
    • 33749661519 scopus 로고    scopus 로고
    • Hospital gets ultra-wideband RFID
    • Collins, J., Hospital gets ultra-wideband RFID. RFID J, 2004.
    • (2004) RFID J
    • Collins, J.1
  • 7
    • 3242725242 scopus 로고    scopus 로고
    • Room for tracking. RFID technology finds the way
    • Glabman, M., Room for tracking. RFID technology finds the way. Mater. Manag. Health Care 13(5):26, 2004.
    • (2004) Mater. Manag. Health Care , vol.13 , Issue.5 , pp. 26
    • Glabman, M.1
  • 9
    • 5144231862 scopus 로고    scopus 로고
    • Radio frequency tags for identifying legitimate drug products discussed by tech industry
    • Thompson, C. A., Radio frequency tags for identifying legitimate drug products discussed by tech industry. Am. J. Health Syst. Pharm. 61(14):1430-1432, 2004.
    • (2004) Am. J. Health Syst. Pharm. , vol.61 , Issue.14 , pp. 1430-1432
    • Thompson, C.A.1
  • 10
    • 57549090091 scopus 로고    scopus 로고
    • Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology
    • 10.1016/j.ijmedinf.2008.06.001
    • Katz, J. E., and Rice, R. E., Public views of mobile medical devices and services: A US national survey of consumer sentiments towards RFID healthcare technology. Int. J. Med. Inform. 78(2):104-114, 2009.
    • (2009) Int. J. Med. Inform. , vol.78 , Issue.2 , pp. 104-114
    • Katz, J.E.1    Rice, R.E.2
  • 13
    • 70350710817 scopus 로고    scopus 로고
    • RFID-based operation room and medicare system for patient safety enhancement - A case study of keelung branch
    • Yu, C., Chen, C., Liao, P., and Lee, Y., RFID-based operation room and medicare system for patient safety enhancement - a case study of keelung branch. J. Inf. Manag. 15:97-122, 2008.
    • (2008) J. Inf. Manag. , vol.15 , pp. 97-122
    • Yu, C.1    Chen, C.2    Liao, P.3    Lee, Y.4
  • 14
    • 57349200762 scopus 로고    scopus 로고
    • Privacy, confidentiality, and electronic medical records
    • 10.1136/jamia.1996.96236282
    • Barrows, R. C., Jr., and Clayton, P. D., Privacy, confidentiality, and electronic medical records. J. Am. Med. Inform. Assoc. 3(2):139-148, 1996.
    • (1996) J. Am. Med. Inform. Assoc. , vol.3 , Issue.2 , pp. 139-148
    • Barrows Jr., R.C.1    Clayton, P.D.2
  • 15
    • 0036318237 scopus 로고    scopus 로고
    • If electronic medical records are so great, why aren't family physicians using them?
    • Loomis, G. A., Ries, J. S., Saywell, R. M., and Thakker, N. R., If electronic medical records are so great, why aren't family physicians using them? J. Fam. Pract. 51(7):636-641, 2002.
    • (2002) J. Fam. Pract. , vol.51 , Issue.7 , pp. 636-641
    • Loomis, G.A.1    Ries, J.S.2    Saywell, R.M.3    Thakker, N.R.4
  • 17
    • 70449485299 scopus 로고    scopus 로고
    • Secure access control schemes for RFID systems with anonymity
    • Japan, IEEE
    • Chien, H. Y., Secure access control schemes for RFID systems with anonymity. FMUIT'06, Japan, IEEE, pp. 96-96, 2006.
    • (2006) FMUIT'06 , pp. 96-96
    • Chien, H.Y.1
  • 20
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • IEEE
    • Henrici, D., and Muller, P., Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. PerSec′04. IEEE, pp. 149-153, 2004.
    • (2004) PerSec'04 , pp. 149-153
    • Henrici, D.1    Muller, P.2
  • 21
    • 33745938362 scopus 로고    scopus 로고
    • RFID security without extensive cryptography
    • ACM
    • Karthikeyan, S., and Nesterenko, M. RFID security without extensive cryptography. SASN, 2005. ACM, pp. 63-67, 2005.
    • (2005) SASN, 2005 , pp. 63-67
    • Karthikeyan, S.1    Nesterenko, M.2
  • 23
    • 49049090312 scopus 로고    scopus 로고
    • Secure and low-cost RFID authentication protocols
    • Florida State University, Department of Computer Science, Tallahassee, Florida, USA
    • Lee, Y. K., and Verbauwhede, I., Secure and low-cost RFID authentication protocols. In: Adaptive Wireless Networks (AWiN). Florida State University, Department of Computer Science, Tallahassee, Florida, USA, pp. 1-5, 2005.
    • (2005) Adaptive Wireless Networks (AWiN) , pp. 1-5
    • Lee, Y.K.1    Verbauwhede, I.2
  • 26
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • Molnar, D., and Wagner, D., Privacy and security in library RFID: Issues, practices, and architectures. ACM, pp. 210-219, 2004.
    • (2004) ACM , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 29
    • 85015582598 scopus 로고    scopus 로고
    • On the keyspace of the Hill cipher
    • 10.1080/0161-110591893771
    • Overbey, J., Traves, W., and Wojdylo, J., On the keyspace of the Hill cipher. Cryptologia 29(1):59-72, 2005.
    • (2005) Cryptologia , vol.29 , Issue.1 , pp. 59-72
    • Overbey, J.1    Traves, W.2    Wojdylo, J.3
  • 30
    • 33745142417 scopus 로고    scopus 로고
    • Sequences of games: A tool for taming complexity in security proofs
    • Shoup, V. Sequences of games: a tool for taming complexity in security proofs. cryptology eprint archive, report 2004/332, 2004.
    • (2004) Cryptology Eprint Archive, Report 2004/332
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.