2001
DOI: 10.1109/2.920607
|View full text |Cite
|
Sign up to set email alerts
|

Protecting privacy in remote-patient monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2004
2004
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(11 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…Unique Patient Identifiers need to be defined before such a scheme would receive widespread adoption. The broader community would also need assurance as to compliance with privacy and other similar legislation (Kara, 2001). It is further suggested that rather than use (random) digit identifiers, patient biometrics would provide a much better access mechanism -in other words comparing freshly captured biometric identifiers with those stored on the smart_device.…”
Section: Discussionmentioning
confidence: 99%
“…Unique Patient Identifiers need to be defined before such a scheme would receive widespread adoption. The broader community would also need assurance as to compliance with privacy and other similar legislation (Kara, 2001). It is further suggested that rather than use (random) digit identifiers, patient biometrics would provide a much better access mechanism -in other words comparing freshly captured biometric identifiers with those stored on the smart_device.…”
Section: Discussionmentioning
confidence: 99%
“…Patient monitoring using wireless technologies is being considered for improving the quality of healthcare to an increased number of patients, especially those in nursing homes and hospitals [1][2][3][4][5]. In general, patient monitoring requirements include periodic transmission of routine vital signs and transmission of alerting signals when vital signs cross a threshold, patients cross a certain boundary, or device battery drops below a level.…”
Section: Introductionmentioning
confidence: 99%
“…From equation (6), the lower bound on W is (20 + 2 × 10) = 40 seconds. Let's assume that W can be set to a minimum of 120 seconds due to key generation and distribution overhead and other concerns.…”
Section: Choosing the Right Cryptographic Mechanismmentioning
confidence: 99%
“…One may avoid using a long duration key by partitioning the traffic of a long session into several sub-flows. However, each of these flows requires additional set-up overhead 4 [6]. For usage scenarios described herein, TKS would be ideal for replacing IKE or other expensive key exchange algorithms (viz, instead of using IKE to change keys for sub-flows of a long session).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation