Privacy in medical emergency system: cryptographic and security aspects
Multilevel security is very important in Medical Emergency System MES since a database contained information with a variety of secret data. Information security was traditionally achieved by the use of encryption of data, but several stored and transmitted data in existing MES are not encrypted...
| Main Authors: | Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/9152/ http://irep.iium.edu.my/9152/1/Privacy_in_medical_emergency_system_-_cryptographic_and_security_aspects.pdf |
Similar Items
Toward confidential distributed medical emergency system and security service
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Confidentiality to service medical emergency model
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
A model for ensuring data confidentiality: In healthcare and medical emergency
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Enchancing QoS protection in MPLS networks
by: Hanshi, Sabri M., et al.
Published: (2010)
by: Hanshi, Sabri M., et al.
Published: (2010)
Integrated Medical Emergency Model: an interactive web-based database
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Implementation of Internet based remote control and monitoring
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2009)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2009)
Integrated Security And Privacy Preservation Approach In Mobile Crowd Sensing
by: Pius, Owoh Nsikak
Published: (2020)
by: Pius, Owoh Nsikak
Published: (2020)
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
Implementation and integration of HF messaging system with cryptographic features
by: Mat Sidek, Abd. Rahim
Published: (2006)
by: Mat Sidek, Abd. Rahim
Published: (2006)
Dynamic traffic light sequence algorithm using RFID
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2008)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2008)
Dynamic traffic light sequence algorithm using RFID
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Noise modulated cryptographic generation for use in UWB wireless communication
by: Yaacob, Siti Hazwani, et al.
Published: (2011)
by: Yaacob, Siti Hazwani, et al.
Published: (2011)
A customizable cryptographic service provider for an embedded cryptohardware system
by: Ahmad, Illiasaak
Published: (2007)
by: Ahmad, Illiasaak
Published: (2007)
Estimations on the security aspect of Brands' electronic cash scheme
by: Chang, Yu Cheng, et al.
Published: (2005)
by: Chang, Yu Cheng, et al.
Published: (2005)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Performance analysis of a free space optics link with multiple transmitters/receivers
by: Md Noor, Nur Haedzerin, et al.
Published: (2012)
by: Md Noor, Nur Haedzerin, et al.
Published: (2012)
Theoretical analysis of multiple transmitters/receivers on the performance of Free Space Optics (FSO) link
by: Md Noor, Nur Haedzerin, et al.
Published: (2011)
by: Md Noor, Nur Haedzerin, et al.
Published: (2011)
Medical emergency and healthcare model: enhancemet with SMS and MMS facilities
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Security performance of QKD
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
MPLS and traffic engineering
by: Hassan, Abdallah, et al.
Published: (2011)
by: Hassan, Abdallah, et al.
Published: (2011)
Dual authentication for bluetooth connection
by: Saliou, Diallo Alhassane, et al.
Published: (2014)
by: Saliou, Diallo Alhassane, et al.
Published: (2014)
Effects of rain on free space optical propagation
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
Preliminary analysis on the effect of rain attenuation on Free Space Optics (FSO) propagation measured in tropical weather condition
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
by: Ahmad Zabidi, Suriza, et al.
Published: (2011)
Research direction in mobile IPV6
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
HMIPV6 based approaches for mobility management
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
FPGA control of quantum channel security
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Medical care system for remote monitoring of foetal ECG
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Advanced RFID security framework for dynamic traffic management
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2011)
Security aspects in the cognition cycle of distributed cognitive radio networks: A survey from a multi-agent perspective
by: Yau, Alvin Kok-Lim *, et al.
Published: (2013)
by: Yau, Alvin Kok-Lim *, et al.
Published: (2013)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
ICT to serve hajj: analytical study
by: Hameed, Shihab A.
Published: (2010)
by: Hameed, Shihab A.
Published: (2010)
Software engineering etchical principles based on Islamic values
by: Shihab, A. Hameed
Published: (2009)
by: Shihab, A. Hameed
Published: (2009)
A secure key distribution protocol based on hash functions and a quantum-authenticated channel using 6DP (KDP-6DP)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2010)
A hybrid protection method to enhance data utility while preserving the privacy of medical patients data publishing
by: Jeba, Shermina, et al.
Published: (2022)
by: Jeba, Shermina, et al.
Published: (2022)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Exploring manet security aspects: analysis of attacks and node misbehaviour issues
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
by: Islam Khan, Burhan Ul, et al.
Published: (2022)
An approach to enhance aggregated source specific multicast scheme
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2008)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2008)
Hybrid Cryptographic Approach for Internet Ofhybrid Cryptographic Approach for Internet Of things Applications: A Review
by: Mohamed, Nur Nabila, et al.
Published: (2020)
by: Mohamed, Nur Nabila, et al.
Published: (2020)
Similar Items
-
Toward confidential distributed medical emergency system and security service
by: Hameed, Shihab A., et al.
Published: (2010) -
Confidentiality to service medical emergency model
by: Hameed, Shihab A., et al.
Published: (2011) -
A model for ensuring data confidentiality: In healthcare and medical emergency
by: Hameed, Shihab A., et al.
Published: (2011) -
Enchancing QoS protection in MPLS networks
by: Hanshi, Sabri M., et al.
Published: (2010) -
Integrated Medical Emergency Model: an interactive web-based database
by: Hameed, Shihab A., et al.
Published: (2010)