2007
DOI: 10.1504/ijeh.2007.015320
|View full text |Cite
|
Sign up to set email alerts
|

Securing electronic health records with novel mobile encryption schemes

Abstract: Mobile devices have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in healthcare applications the privacy and security of the transmitted information must be preserved. Therefore applications require a concrete security framework based on long-term security keys, such as the security key that can be found in a mobile Subscriber Identity Module (SIM). The wireless nature of communication links in mobile networks presents a major… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…Most emerging services use HTTP over SSL, but we know of one approach leveraging SIM-card support in mobile phones [37]. Key management remains a challenge, however.…”
Section: Disclosure Threatsmentioning
confidence: 99%
“…Most emerging services use HTTP over SSL, but we know of one approach leveraging SIM-card support in mobile phones [37]. Key management remains a challenge, however.…”
Section: Disclosure Threatsmentioning
confidence: 99%
“…Medical agents have to authenticate themselves to know health condition of patients. In cloud based remote health framework, cloud service provider maintains biometric database where data are stored in encrypted format [5] [6]. Blind protocol technique [7] could be used to reveal only identity without any additional information about the user [8].…”
Section: State Of the Artmentioning
confidence: 99%
“…Majority of the research to date in electronic and mobile healthcare focuses on the security actions before and while the data is downloaded [2]. However,the trust delegated data should not be left unprotected on the mobile devices of the requesting healthcare staff.…”
Section: Fig 1 Entities In the Communication Modelmentioning
confidence: 99%
“…One of our previous publications discussed the framework and protocol to protect the healthcare data from security vulnerabilities during the data transmission between a server and a mobile device [2]. However protecting the data whilst it is inside the mobile device was mentioned as a future need.…”
Section: Trust Negotiation In Mobile Devicesmentioning
confidence: 99%