SCB-HC-ECC–based privacy safeguard protocol for secure cloud storage of smart card–based health care system

S Senthilkumar, K Brindha, N Kryvinska… - Frontiers in Public …, 2021 - frontiersin.org
The advent of the internet has brought an era of unprecedented connectivity between
networked devices, making one distributed computing, called cloud computing, and popular …

An investigation of healthcare professionals' intention to use Smart Card Technology

L Malungana, L Motsi - South African Journal of Information …, 2024 - scielo.org.za
Abstract MALUNGANA, Lario and MOTSI, Lovemore. An investigation of healthcare
professionals' intention to use Smart Card Technology. SAJIM (Online)[online]. 2024, vol. 26 …

A secure and lightweight three-factor authentication and key generation scheme for direct communication between healthcare professionals and patient's WMSN

A Sammoud, MA Chalouf, O Hamdi… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
One of the main security issues in telecare medecine information systems is the remote user
authentication and key agreement between healthcare professionals and patient's medical …

A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity

A Sammoud, MA Chalouf, O Hamdi… - 2020 International …, 2020 - ieeexplore.ieee.org
E-Health systems, specifically, Telecare Medical Information Systems (TMIS), are deployed
in order to provide patients with specific diseases with healthcare services that are usually …

Using Biometrics for Authentication in e-Health Systems

O HAMDI, MA CHALOUF… - e-Health Security …, 2024 - books.google.com
To ensure continuous patient monitoring, e-health systems enable healthcare professionals
to remotely access medical servers to consult patient medical information. The use of …

JKSCI

JS Park, BA Rhee… - Journal of The Korea …, 2023 - koreascience.kr
The purpose of this study is to shed light on the relationship between perceived value (PV),
attitude toward the exhibition (ATYCSE), and behavioral intention toward the exhibition …

Utilisation de la biométrie pour l'authentification dans les systèmes e-santé

O HAMDI - Gestion de la sécurité en e-santé: Sécurité des …, 2024 - books.google.com
Afin d'assurer un suivi continu des patients, les systèmes e-santé offrent la possibilité aux
professionnels de santé d'accéder, à distance, aux serveurs médicaux pour consulter les …

A Framework for Cloud-Based EHR Security Using Hybrid Cryptographic Methods of AES and ECC

V Arora - 2023 - norma.ncirl.ie
The establishment of electronic health records (EHRs) for patient monitoring is a notion that
has gained widespread acceptance in the healthcare sector. Patients can contact their …

Analysis of Al-Saggaf et al's Three-factor User Authentication Scheme for TMIS

MO Park - 한국컴퓨터정보학회논문지, 2021 - dbpia.co.kr
In this paper, we analyzed that the user authentication scheme for TMIS (Telecare Medicine
Information System) proposed by Al-Saggaf et al. In 2019, Al-Saggaf et al. proposed …