Data Protection and Privacy in Healthcare 2021
DOI: 10.1201/9781003048848-3
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Authentication and Key-Management Protocol for Health Information Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 50 publications
(9 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…It has been clearly noticed from Figure 1 that sensing device, group heads (CH) and another intelligent mechanics transmitted information in the direction of sink node or information server. WSNs security plays an important role to deliver secure transmission from sensor nodes to sink node (Reddy and Gayathri, 2020; Soni and Singh, 2021; Nair et al , 2020; Soni et al , 2020).…”
Section: Introductionmentioning
confidence: 99%
“…It has been clearly noticed from Figure 1 that sensing device, group heads (CH) and another intelligent mechanics transmitted information in the direction of sink node or information server. WSNs security plays an important role to deliver secure transmission from sensor nodes to sink node (Reddy and Gayathri, 2020; Soni and Singh, 2021; Nair et al , 2020; Soni et al , 2020).…”
Section: Introductionmentioning
confidence: 99%
“…Just 25 chest X-ray images in each class are based on this model – regular and COVID-19. Moreover, researchers are trying to further apply this proposed method on real-life AI-based approaches; these approaches are based on optimization, Metaheuristi, ML, DL (Dhiman and Kumar, 2017; Dhiman and Kumar, 2018; Dhiman and Kumar, 2019; Dhiman and Kaur, 2019; Kaur et al , 2020) and proposing security protocols for established secure communication among the servers and clients applications (Dehghani et al , 2019; Dehghani et al , 2020a; Dehghani et al , 2020b; Dehghani et al , 2020c; Dhiman, 2019; Dhiman et al , 2021; Dhiman et al , 2020b; Limbasiya et al , 2018; Dhiman et al , 2020a; Soni and Kumar, 2020; Soni and Singh, 2021; Soni et al , 2020a; Soni and Jain, 2018; Soni et al , 2020c; Soni et al , 2021).…”
Section: Background Studymentioning
confidence: 99%
“…and proposing security protocols for established secure communication among the servers and clients applications (Dehghani et al, 2019; Dehghani et al, 2020a; Dehghani et al,Dehghani et al, 2020c;Dhiman, 2019;Dhiman et al, 2021;Dhiman et al, 2020b;Limbasiya et al, 2018;Soni and Kumar, 2020;Soni and Singh, 2021;Soni et al, 2020c;.…”
mentioning
confidence: 99%
“…Also, they discussed the impact of COVID-19 on humans (Liu et al, 2018). Moreover researchers are proposing various security protocols (Dhiman et al, 2020a;Pandey et al, 2020;Soni and Kumar, 2020;Soni and Singh, 2021;Nair et al, 2020;Soni et al, 2020a;Patel et al, 2020;Soni et al, 2020b;Chaudhary et al, 2021) for providing secure commendation during the data transmission among servers and clients for generating data sets, that data sets can be used in various machine learning approaches for different methodologies. Bai et al (2020) proposed his study Liu et al (2020) that viral pneumonia and COVID-19 have distinct feature sets, and the primary features are distribution, ground-glass opacity and vascular thickening.…”
Section: Literature Surveymentioning
confidence: 99%