2011
DOI: 10.1016/j.procs.2011.07.070
|View full text |Cite
|
Sign up to set email alerts
|

Security of MBAN based Health Records in Mobile Broadband Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…Descriptive Analysis is applied to understand the level of agreements among the mobile phone users related to the proposed techniques of multi-factoring, ciphering and watermarking.In the descriptive analysis, each of the items in each of components A, B, C, and D is measured in terms of mean, standard deviation, level, and rank. The mean value is considered the highest if it is at the highest rank which starts with rank 1.In this analysis, level of agreement is determined based on three (3) categories namely low, moderate, and high with the minimum value range is set not less than one (1), and maximum range is not more than five (5). Therefore, the formula to set the range for each category should be set as (5-1) / 3 = 1.33 based on the formula adopted by George and Mallery (2013).…”
Section: Descriptive Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Descriptive Analysis is applied to understand the level of agreements among the mobile phone users related to the proposed techniques of multi-factoring, ciphering and watermarking.In the descriptive analysis, each of the items in each of components A, B, C, and D is measured in terms of mean, standard deviation, level, and rank. The mean value is considered the highest if it is at the highest rank which starts with rank 1.In this analysis, level of agreement is determined based on three (3) categories namely low, moderate, and high with the minimum value range is set not less than one (1), and maximum range is not more than five (5). Therefore, the formula to set the range for each category should be set as (5-1) / 3 = 1.33 based on the formula adopted by George and Mallery (2013).…”
Section: Descriptive Analysismentioning
confidence: 99%
“…Wireless communications using mobile phones are not safe and have very high risk of being hacked if not properly protected (Acharya and Kumar, 2011;Belkhedeet al, 2012;Elkhart al., 2012).The hackers may intrude to steal or sniff the information or data being communicated using mobile apps.The mobile communications involving the use of apps can be protected by controlling the access to the apps by using user authentication with unique username and password.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Communication using mobiles are vulnerable to hacking activities by intruders [1], [8], [11] which mean good protection is required for any communications done using mobile devices including mobile phones. Mobile apps are among those that require such protection.…”
Section: Introductionmentioning
confidence: 99%
“…Mobile apps are among those that require such protection. The protection of mobile apps can be obtained by using strong user authentication such as multi-factor user authentication [1], [11], [5]. This means more than the normal single-factor (e.g.…”
Section: Introductionmentioning
confidence: 99%