A secure authentication scheme for telecare medicine information systems

ZY Wu, YC Lee, F Lai, HC Lee, Y Chung - Journal of medical systems, 2012 - Springer
The telecare medicine information system enables or supports health-care delivery services.
In recent years, the increased availability of lower-cost telecommunications systems and …

Security privacy and policy for cryptographic based electronic medical information system

HY Chen, ZY Wu, TL Chen, YM Huang, CH Liu - Sensors, 2021 - mdpi.com
With the development of the internet, applications have become complicated, and the
relevant technology has diversified. Compared with medical applications, the significance of …

An efficient and reliable E-DRM scheme for mobile environments

CC Chang, JH Yang, DW Wang - Expert Systems with Applications, 2010 - Elsevier
Enterprise Digital Right Management (E-DRM) scheme is a mechanism that protects the
confidential information of an enterprise from illegal accesses. In 2008, Chen proposed an E …

A password-based user authentication scheme for the integrated EPR information system

ZY Wu, Y Chung, F Lai, TS Chen - Journal of medical systems, 2012 - Springer
With the rapid development of the Internet, digitization and electronic orientation are
required in various applications of our daily life. For e-medicine, establishing Electronic …

A secure ownership transfer protocol using EPCglobal Gen-2 RFID

CL Chen, YC Huang, JR Jiang - Telecommunication Systems, 2013 - Springer
Abstract Radio Frequency Identification (RFID) is a relatively new technology. In recent
years, it has been shown to be convenient and feasible in many applications. However …

[HTML][HTML] Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system

SKH Islam, GP Biswas - Journal of King Saud University-Computer and …, 2015 - Elsevier
Recently, Wu et al. proposed a password-based remote user authentication scheme for the
integrated Electronic Patient Record (EPR) information system to achieve mutual …

[PDF][PDF] An all-in-one mobile DRM system design

CL Chen - Int. J. Innov. Comput. Inf. Control, 2010 - ir.lib.cyut.edu.tw
Intellectual property violation events have caused enterprises to respect digital content
protection. However, valuable digital content without effective management mechanisms will …

A secure integrated medical information system

TC Hsiao, ZY Wu, YF Chung, TS Chen… - Journal of Medical …, 2012 - Springer
The rapid rise and development of the internet has made digitization of our everyday life
common. E-medicine, including electronic prescription records, electronic prescriptions …

A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices

EJ Yoon, SB Choi, KY Yoo - International Journal of Innovative Computing …, 2012 - ijicic.org
In 2009, Yang and Chang proposed an ID-based remote mutual authentication with key
agreement scheme on elliptic curve cryptosystem (ECC). Based upon ID-based concept …

The digital teaching legacy of the International Polar Year (IPY): Details of a present to the global village for achieving sustainability

F Huettmann - 18th International Workshop on Database and …, 2007 - ieeexplore.ieee.org
IPY helps to overcome national and other borders and constraints towards better information
access and management of precious natural resources worldwide. It carries promises of a …