2020
DOI: 10.1007/s11042-020-10134-x
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 45 publications
(144 reference statements)
0
10
0
Order By: Relevance
“…In recent studies, Deebak et al [ 14 ] have device single user sign-in (SUSI) mechanism for the protection of multimedia data using the public key and encryption-decryption method in Remote Medical Point of Care (RM-PoC). The simulation studies have shown the higher efficiency in data computation and data transmission processes.…”
Section: Related Workmentioning
confidence: 99%
“…In recent studies, Deebak et al [ 14 ] have device single user sign-in (SUSI) mechanism for the protection of multimedia data using the public key and encryption-decryption method in Remote Medical Point of Care (RM-PoC). The simulation studies have shown the higher efficiency in data computation and data transmission processes.…”
Section: Related Workmentioning
confidence: 99%
“…Existing solutions include the use of multifactor authentication and the monitoring of the log activity of user accounts and revoking account access if no longer needed [ 10 ]. Deebak et al [ 51 ] proposed a chaotic map–based authenticated security framework for remote point of care. Health organizations such as those in the United Kingdom have started using services to monitor their remote access infrastructure constantly and to investigate anomalies.…”
Section: Resultsmentioning
confidence: 99%
“…Argaw et al [10] Apply multifactor authentication Deebak et al [51] Apply a chaotic map-based authenticated security framework for remote point of care Zorz [52] Apply remote access monitoring such as the NHS d attack surface reduction rules NHS Digital [53] Apply perimeter security solution such as NHS Secure Boundary to enable secure access Rezaeibagha et al [54] The health care sector needs to ensure data protection mechanisms for securing system access and transmitting data…”
Section: Secure the Remote Work Environmentmentioning
confidence: 99%
“…As a result, the TA uses the symmetric key S to recover the vehicle nonce n from the challenge Ch to help in computing its response Rp using (24).…”
Section: Registration Phasementioning
confidence: 99%