1 |
M. Vigil, D. Cabarcas, J. Buchmann, J. Huang, "Assessing trust in the long-term protection of documents", 2013 IEEE Symposium on Computers and Communication(ISCC),Split, Croatia, 7-10 July 2013. DOI: https://doi.org/10.1109/ISCC.2013.6754943
|
2 |
W. Lei, Y. Li, Y. Sang, H. Shen, "A Secure Anonymous Authentication Scheme for Electronic Medical Records Systems", 2016 IEEE 13th International Conference on e-Business Engineering (ICEBE), pp. 48-55, Macau, China, Nov. 2016. DOI: https://doi.org/10.1109/ICEBE.2016.019
|
3 |
V. Liu, M. Musen,T. Chou, "Data Breaches of Protected Health Information in the United States", Journal of the American Medical Association, Vol.313, No.14, pp.1471-1473, 2015. DOI: https://doi.org/10.1001/jama.2015.2252
DOI
|
4 |
H. Ma, R. Zhang, G. Yang, Z. Song, K. He, Y. Xiao, "Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices", IEEE Transactions on Dependable and Secure Computing, pp.1-11, June 2018. DOI: https://doi.org/10.1109/TDSC.2018.2844814
|
5 |
C. S. Kruse, B. Smith, H. Vanderlinden, A. Nealand, "Security Techniques for the Electronic Health Records", Journal of Medical Systems, Vol.41, No.8, pp.127-139, July 2017. DOI: https://doi.org/10.1007/s10916-017-0778-4
DOI
|
6 |
J. S. Lee, H. J. Kim, M. S. Jun, "A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad," Journal of the Korea Academia-Industrial, Vol.14, No.3, pp.1428-1438, 2015. DOI: http://dx.doi.org/10.5762/KAIS.2013.14.3.1428
|
7 |
J. W. Kim, J. H. Park, M. S. Jun, "A Design of Smart Banking System using Digital Signature based on Biometric Authentication", Journal of the Korea Academia-Industrial, Vol.16, No.9, pp.6282-6289, 2015. DOI: http://dx.doi.org/10.5762/KAIS.2015.16.9.6282
DOI
|
8 |
G. D. Mogli, "Fingerprint-based crypto-biometric system for network security", Journal on Information Security, Vol.2, No.4, pp.156-165, 2011. DOI: http://dx.doi.org/10.4038/sljbmi.v2i4.2245
|
9 |
S. Y. Min, B. W. Jin, "Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment," Journal of the Korea Academia-Industrial, Vol.15, No.6, pp.3865-3871, 2014. DOI: http://dx.doi.org/10.5762/KAIS.2014.15.6.3865
DOI
|
10 |
S. Barman, D. Samanta, S. Chattopadhyay, "Role of Biometrics in healthcare privacy and security management system", Journal of Bio-Medical Informatics, Vol.2015, No.3, pp.1-12, April 2015. DOI: https://doi.org/10.1186/s13635-015-0020-1
|
11 |
Zhou, X. Lin, X. Dong, Z. Cao, "PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System", IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.6, pp.1693-1703, 2015. DOI: https://doi.org/10.1109/TPDS.2014.2314119
DOI
|
12 |
H. Chao, S. Twu, C. Hsu, "A Patient-Identity Security Mechanism For Electronic Medical Records (EMRs) During Transit and At Rest", Journal of Medical Informatics and the Internet in Medicine, Vol.30, No.3, pp.227-240, July 2009. DOI: https://doi.org/10.1080/14639230500209443
|
13 |
W. Yang, S. Wang, J. Hu, G. Zheng, C. Valli, "Security and accuracy of fingerprint-based biometrics: A review", International Journal of Symmetry, Vol.11, No.2, pp.141-150, 2019. DOI: https://doi.org/10.3390/sym11020141
DOI
|
14 |
N. Lo, C. Wu, Yo. Chuang, "An authentication and authorization mechanism for long-term electronic health records management", Journal of Procedia Computer Science, Vol.111, pp.145-453, 2017. DOI: https://doi.org/10.1016/j.procs.2017.06.021
DOI
|