An investigation of the secure data communication in medical mobile applications
Nowadays, medical applications (apps) have become a rapidly growing and basic tool in medical education, patient care and clinical research that are vitally important to aware people with a health signal. Similar to other sorts of telecommunication and Internet applications, the medical apps are vul...
| Main Authors: | Aminnezhad, Asou, Abdullah @ Selimun, Mohd Taufik, Hezave, Pooya Khanmohamadi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Asian Research Publication Network
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/43731/ http://psasir.upm.edu.my/id/eprint/43731/1/An%20investigation%20of%20the%20secure%20data%20communication%20in%20medical%20mobile%20applications.pdf |
Similar Items
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013)
by: Aminnezhad, Asou, et al.
Published: (2013)
Mobile forensic data acquisition in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
The techniques of securing imaging data in medical system
by: Sian, Soo M., et al.
Published: (2020)
by: Sian, Soo M., et al.
Published: (2020)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Security against DoS attack in mobile IP communication
by: Parvin, S., et al.
Published: (2009)
by: Parvin, S., et al.
Published: (2009)
Watermark blending technique for securing user authentication data in mobile application systems
by: Mohamed, Kartini, et al.
Published: (2019)
by: Mohamed, Kartini, et al.
Published: (2019)
Secure data communication using blind source separation
by: Kumar, Anil, et al.
Published: (2008)
by: Kumar, Anil, et al.
Published: (2008)
Securing peer-to-peer mobile communications using
public key cryptography: new security strategy
by: Al- Bakri, S.H., et al.
Published: (2011)
by: Al- Bakri, S.H., et al.
Published: (2011)
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by: Jamal, Fara, et al.
Published: (2018)
by: Jamal, Fara, et al.
Published: (2018)
Security of NFC payment on mobile payment application
by: Wong, Wen Teng
Published: (2018)
by: Wong, Wen Teng
Published: (2018)
Advances of mobile forensic procedures in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Securing medical data transmission systems based on integrating algorithm of encryption and steganography
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
by: Hashim, Mohammed Mahdi, et al.
Published: (2020)
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
STCM: Secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
by: Khan, Burhan Ul Islam, et al.
Published: (2017)
STCM: secured trust-based communication method in vulnerable mobile adhoc network
by: Khan, Burhan ul Islam, et al.
Published: (2016)
by: Khan, Burhan ul Islam, et al.
Published: (2016)
A systematic literature review for topic detection in chat conversation for cyber-crime investigation
by: Husin, Norzihan, et al.
Published: (2014)
by: Husin, Norzihan, et al.
Published: (2014)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Integrated home security system :Module on mobile application
by: Muhammad Izzat, Ramli
Published: (2010)
by: Muhammad Izzat, Ramli
Published: (2010)
Investigation of path loss models for mobile communications in Malaysia
by: Chebil, Jalel, et al.
Published: (2011)
by: Chebil, Jalel, et al.
Published: (2011)
Security threats to privacy data of Malaysian youth’s: online transaction and communication
by: Shariffah Mamat,, et al.
Published: (2023)
by: Shariffah Mamat,, et al.
Published: (2023)
Mobile augmented reality application in medical education in the 2010s
by: Shook, Chin Yap, et al.
Published: (2021)
by: Shook, Chin Yap, et al.
Published: (2021)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
by: Mehdizadeh, Abbas, et al.
Published: (2008)
by: Mehdizadeh, Abbas, et al.
Published: (2008)
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by: Jamal, Fara, et al.
Published: (2020)
by: Jamal, Fara, et al.
Published: (2020)
Mobile agent based multi-layer security framework for cloud data centers
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol
by: Jaisan S M, Ashish
Published: (2024)
by: Jaisan S M, Ashish
Published: (2024)
Developing Mobile Application For Generic Human-Machine Communication
by: Lau, Dick Mun
Published: (2018)
by: Lau, Dick Mun
Published: (2018)
An effective security alert mechanism for real-time phishing tweet detection on twitter
by: Mohd Sani, Nor Fazlida, et al.
Published: (2019)
by: Mohd Sani, Nor Fazlida, et al.
Published: (2019)
Application adaptive exponential synchronization of chaotic dynamical systems in secure communications
by: Maheri, Mahmoud, et al.
Published: (2017)
by: Maheri, Mahmoud, et al.
Published: (2017)
Secure E - Medical record system
by: Law, Jennifer
Published: (2005)
by: Law, Jennifer
Published: (2005)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
Cybersecurity in Big Data Era: From Securing Big Data to Data-Driven Security
by: Manjunatha, V., et al.
Published: (2024)
by: Manjunatha, V., et al.
Published: (2024)
A novel mobile web application for an integrated medical and emergency model
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
by: Shaikh, Muhammad Umair, et al.
Published: (2018)
by: Shaikh, Muhammad Umair, et al.
Published: (2018)
Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network
by: Adnan, Shahid Khan
Published: (2014)
by: Adnan, Shahid Khan
Published: (2014)
Secure mobile VoIP
by: Talevski, Alex, et al.
Published: (2007)
by: Talevski, Alex, et al.
Published: (2007)
Similar Items
-
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016) -
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013) -
Mobile forensic data acquisition in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014) -
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014) -
The techniques of securing imaging data in medical system
by: Sian, Soo M., et al.
Published: (2020)