To protect the health information security, cryptography plays an important role to establish confidentiality, authentication, integrity and non-repudiation. Keys used for encryption/decryption and digital signing must be managed in a safe, secure, effective and efficient fashion. The certificate-based Public Key Infrastructure (PKI) scheme may seem to be a common way to support information security; however, so far, there is still a lack of successful large-scale certificate-based PKI deployment in the world. In addressing the limitations of the certificate-based PKI scheme, this paper proposes a non-certificate-based key management scheme for a national e-health implementation. The proposed scheme eliminates certificate management and com...
Traditional encryption, which protects messages from prying eyes, has been used for many decades. Th...
Due to the development of information technology (IT), it has been applied to various fields such as...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
The Health Insurance Portability and Accountability Act (HIPAA) has set privacy and security regulat...
Includes bibliographical references (page 31).Security for electronic commerce has become increasing...
A public key infrastructure (PKI) secures lots of applications and processes. These are for example ...
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Conventi...
Recently, Malaysia’s national health statistics show an advancement in term of its quality towards b...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
If the quality and efficiency of medical services are to be ensured, electronic health records (EHR)...
In an organization with its own Private Network, it is not just enough to transfer the documents fro...
In an organization with its own Private Network , it is not just enough to transfer the documents fr...
Group-based systems, such as e-health systems, have been introduced since the last few decades. E-he...
What are the nails for which public key technologies are supposed to be the hammer? This paper exami...
Traditional encryption, which protects messages from prying eyes, has been used for many decades. Th...
Due to the development of information technology (IT), it has been applied to various fields such as...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...
The use of insecure networks -such as the Internet- to send and receive information has made the nee...
The Health Insurance Portability and Accountability Act (HIPAA) has set privacy and security regulat...
Includes bibliographical references (page 31).Security for electronic commerce has become increasing...
A public key infrastructure (PKI) secures lots of applications and processes. These are for example ...
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Conventi...
Recently, Malaysia’s national health statistics show an advancement in term of its quality towards b...
Security mechanisms can only be effective if they are usable as well. Above all, this statement appl...
If the quality and efficiency of medical services are to be ensured, electronic health records (EHR)...
In an organization with its own Private Network, it is not just enough to transfer the documents fro...
In an organization with its own Private Network , it is not just enough to transfer the documents fr...
Group-based systems, such as e-health systems, have been introduced since the last few decades. E-he...
What are the nails for which public key technologies are supposed to be the hammer? This paper exami...
Traditional encryption, which protects messages from prying eyes, has been used for many decades. Th...
Due to the development of information technology (IT), it has been applied to various fields such as...
Public-key infrastructures are increasingly being used as foundation for several security solutions,...