Secure topology for electronic medical record transmission
In this study, handshake protocol for patient, medical center and doctor, medical center is proposed for electronic medical record transmission to improve the confidentiality of data transmission and non-repudiation of sending and receiving medical records. The proposed topology depends on symmetric...
| Main Authors: | Alanazi, Hamdan O., M.L., Mat Kiah, Zaidan, Bilal Bahaa, Zaidan, A.A., Alam, Gazi Mahabubul |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Alert
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/21853/ http://irep.iium.edu.my/21853/1/Secure_topology_for_electronic_medical_record_transmission.pdf |
Similar Items
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy
by: Al- Bakri, S.H., et al.
Published: (2011)
by: Al- Bakri, S.H., et al.
Published: (2011)
Spam influence on business and economy: theoretical
and experimental studies for textual anti-spam filtering
using mature document processing and naive Bayesian
classifier
by: Zaidan , A. A., et al.
Published: (2011)
by: Zaidan , A. A., et al.
Published: (2011)
Suitability of using symmetric key to secure multimedia data: an overview,
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Video compression techniques: an overview
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Secure E - Medical record system
by: Law, Jennifer
Published: (2005)
by: Law, Jennifer
Published: (2005)
Adopting a knowledge management concept in securing the privacy of electronic medical record systems
by: Samsuri, Suhaila, et al.
Published: (2013)
by: Samsuri, Suhaila, et al.
Published: (2013)
Electronic patient medical record to facilitate patient monitoring
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Securing medical data transmission systems based on integrating algorithm of encryption and steganography
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
Challenges of hidden data in the unused area two within executable files
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Blockchain-based secure medical record sharing system
by: Tian, Xiang Yang
Published: (2019)
by: Tian, Xiang Yang
Published: (2019)
Clinic management system :electronic medical records systems
by: Nur Syatirah, Mohd Adzhar
Published: (2005)
by: Nur Syatirah, Mohd Adzhar
Published: (2005)
Secured HF image transmission system
by: Shameri, Ahmad Zuri
Published: (2006)
by: Shameri, Ahmad Zuri
Published: (2006)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
Network Analysis of Power Transmission System Topology
by: Muhammad, jawad, et al.
Published: (2013)
by: Muhammad, jawad, et al.
Published: (2013)
XML for browser-based electronic medical records / Maizirah Ibrahim
by: Maizirah, Ibrahim
Published: (2005)
by: Maizirah, Ibrahim
Published: (2005)
Global experience of antimicrobial stewardship integration in electronic medical records: a scoping review
by: Mahmud, Aidalina, et al.
Published: (2024)
by: Mahmud, Aidalina, et al.
Published: (2024)
A review on multimedia communications cryptography
by: Salem, Yasser, et al.
Published: (2011)
by: Salem, Yasser, et al.
Published: (2011)
Enhancing selective encryption for H.264/AVC using advanced encryption standard
by: Abomhara, Mohamed, et al.
Published: (2010)
by: Abomhara, Mohamed, et al.
Published: (2010)
Extracting epidemiological data from electronic medical record recording systems in United Kingdom primary care
by: Basra, Vishal
Published: (2017)
by: Basra, Vishal
Published: (2017)
Medical students’ behavioral intention to adopt electronic health record system
by: Nazmus, Sakib, et al.
Published: (2017)
by: Nazmus, Sakib, et al.
Published: (2017)
Medical students’ behavioral intention to adopt electronic health record system
by: Md. Nazmus, Sakib, et al.
Published: (2017)
by: Md. Nazmus, Sakib, et al.
Published: (2017)
An overview of electronic medical record implementation in healthcare system: Lesson to learn
by: Khamis, Noraziani, et al.
Published: (2013)
by: Khamis, Noraziani, et al.
Published: (2013)
XML for browser-based electronic medical records / Hafizam Mat Hussin
by: Hafizam, Mat Hussin
Published: (2005)
by: Hafizam, Mat Hussin
Published: (2005)
Electronic medical records system (EMRS) for Muslim's information and knowledge sharing
by: Raja Yaacob, Raja Abdullah, et al.
Published: (2011)
by: Raja Yaacob, Raja Abdullah, et al.
Published: (2011)
"Stego-Analysis Chain, Session One" investigations on steganography weakness Vs stego-analysis system for multimedia file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Novel simulation framework of three-dimensional skull bio-metric measurement
by: Hameed, Shihab A., et al.
Published: (2009)
by: Hameed, Shihab A., et al.
Published: (2009)
A transmission electron microscopy study of anticoagulant-induced platelet vesiculation
by: Almhanawai, Bahaa Hadi Jaber, et al.
Published: (2017)
by: Almhanawai, Bahaa Hadi Jaber, et al.
Published: (2017)
The utilization of digital fault recorders in protection, system analysis on Tenaga Nasional Berhad transmission system
by: Mohd. Zin, Abdullah Asuhaimi, et al.
Published: (2007)
by: Mohd. Zin, Abdullah Asuhaimi, et al.
Published: (2007)
Optimizing security and flexibility by designing a high security system for e-government servers
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
by: Abdul Talib, Yurita Yakimin, et al.
Published: (2009)
Privacy in medical emergency system: cryptographic and security aspects
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Security improvement of credit card online purchasing system
by: Naji, Ahmed Wathik, et al.
Published: (2011)
by: Naji, Ahmed Wathik, et al.
Published: (2011)
A further editorial guideline for writing manuscript in the field of social science A special perspective for African journal of business management
by: Alam, Gazi Mahabubul
Published: (2011)
by: Alam, Gazi Mahabubul
Published: (2011)
Has secondary science education become an elite product in emerging nations?- A perspective of sustainable education in the era of MDGs and SDGs
by: Alam, Gazi Mahabubul
Published: (2023)
by: Alam, Gazi Mahabubul
Published: (2023)
The relationship between figureheads and managerial leaders in the private university sector: a decentralised, competency-based leadership model for sustainable higher education
by: Alam, Gazi Mahabubul
Published: (2022)
by: Alam, Gazi Mahabubul
Published: (2022)
Sustainable education and sustainability in education: the
reality in the era of internationalisation and commodification
in education—is higher education different?
by: Alam, Gazi Mahabubul
Published: (2023)
by: Alam, Gazi Mahabubul
Published: (2023)
Transforming the paradigm of public university leadership into a more political one in emerging nations: a case of Bangladesh
by: Alam, Gazi Mahabubul
Published: (2023)
by: Alam, Gazi Mahabubul
Published: (2023)
Does online technology provide sustainable HE or aggravate diploma disease? Evidence from Bangladesh—a comparison of conditions before and during COVID-19
by: Alam, Gazi Mahabubul
Published: (2021)
by: Alam, Gazi Mahabubul
Published: (2021)
Clustering education policy in secondary provision: Impact on higher education and job market
by: Alam, Gazi Mahabubul
Published: (2021)
by: Alam, Gazi Mahabubul
Published: (2021)
Challenges for the beginners to hit the hegemony and anarchy
by: Alam, Gazi Mahabubul
Published: (2024)
by: Alam, Gazi Mahabubul
Published: (2024)
“Stego-analysis chain, session two” novel approach of stego-analysis system for image file
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Similar Items
-
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy
by: Al- Bakri, S.H., et al.
Published: (2011) -
Spam influence on business and economy: theoretical
and experimental studies for textual anti-spam filtering
using mature document processing and naive Bayesian
classifier
by: Zaidan , A. A., et al.
Published: (2011) -
Suitability of using symmetric key to secure multimedia data: an overview,
by: Abomhara, Mohamed, et al.
Published: (2010) -
Video compression techniques: an overview
by: Abomhara, Mohamed, et al.
Published: (2010) -
Secure E - Medical record system
by: Law, Jennifer
Published: (2005)