2004
DOI: 10.1007/978-3-540-25978-7_100
|View full text |Cite
|
Sign up to set email alerts
|

Network and Application Security in Mobile e-Health Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2004
2004
2018
2018

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…there have been works done in the underlying networks and application security services integrated into health networks by looking for mobile specific requirements [52,53]. Due to the demand, IEEE 11,073 workgroup formed a sub-workgroup for cybersecurity to support secure health data exchange between personal health devices (PHD) and their clients.…”
Section: Diseases Based Geographic Areas Relationships Modelling Techmentioning
confidence: 99%
“…there have been works done in the underlying networks and application security services integrated into health networks by looking for mobile specific requirements [52,53]. Due to the demand, IEEE 11,073 workgroup formed a sub-workgroup for cybersecurity to support secure health data exchange between personal health devices (PHD) and their clients.…”
Section: Diseases Based Geographic Areas Relationships Modelling Techmentioning
confidence: 99%
“…The commonly used security protection for mobile device that uses wireless LAN are user authentication and encrypted wireless network such as Wi Fi Protected Access (WPA) (Ahmad, 2003;Bowman, 2003;Johari, 2009). In addition SSL is also used on wireless devices to provide transport level security (Gupta and Gupta, 2001;Marti et al, 2004).…”
Section: Mobile Threatsmentioning
confidence: 99%
“…The commonly used security protection for mobile device that uses wireless LAN are user authentication and encrypted wireless network (Elkhodr et al, 2011;Jaizanuar, 2009;Yu et al, 2008;Ahmad, 2003). In addition SSL is also used on wireless devices to provide transport level security (Gupta and Gupta, 2001;Marti et al, 2004).…”
Section: Security Technologiesmentioning
confidence: 99%