scispace - formally typeset
Proceedings ArticleDOI

Implementation of Elliptic-Curve Cryptography on Mobile Healthcare Devices

Reads0
Chats0
TLDR
The motivation for this paper was to formulate a secure protocol which comprises of signature, encryption and authentication (SEA) as a combined ingredient of secure remote patient monitoring application using mobile devices to be acceptable to both clinicians and patients.
Abstract
Over the past few years, much research attention has been afforded to the application of remote patient monitoring using embedded mobile devices. However, relatively little research has been done to investigate the security aspects of such scenarios. The present work describes the implementation of a cryptographic algorithm based on elliptic curves on an embedded mobile device useful for healthcare purposes. A personal digital assistant (PDA) has been chosen to be the hardware platform for the implementation as it is particularly suitable for remote patient monitoring applications. The motivation for this paper was to formulate a secure protocol which comprises of signature, encryption and authentication (SEA) as a combined ingredient of secure remote patient monitoring application using mobile devices. This needed to be easy to use and computationally efficient in order to be acceptable to both clinicians and patients and the results indicate a positive outcome.

read more

Citations
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI

Unobtrusive Sensing and Wearable Devices for Health Informatics

TL;DR: This paper aims to provide an overview of four emerging unobtrusive and wearable technologies, which are essential to the realization of pervasive health information acquisition, including: 1) unobTrusive sensing methods, 2) smart textile technology, 3) flexible-stretchable-printable electronics, and 4) sensor fusion.
Journal ArticleDOI

Monitoring patients via a secure and mobile healthcare system

TL;DR: Several techniques that can be used to monitor patients effectively and enhance the functionality of telemedicine systems are presented, and how current secure strategies can impede the attacks faced by wireless communications in healthcare systems and improve the security of mobile healthcare is discussed.
Journal ArticleDOI

Search Techniques for the Web of Things: A Taxonomy and Survey

TL;DR: This survey reviews the state-of-the-art search methods for the Web of Things, which are classified according to three different viewpoints: basic principles, data/knowledge representation, and contents being searched.
Journal ArticleDOI

A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes

TL;DR: This paper proposes a much stronger privacy protection for an end-to-end VoIP that applies not only the Elliptic-Curve Diffie-Hellman (ECDH) algorithm for key negotiation, but also the key generation function (KGF) for changing key dynamically in a VoIP call session.
References
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Book

Elliptic Curve Public Key Cryptosystems

TL;DR: In conclusion, the proposed solution to the Elliptic Curve Logarithm Problem is a simple one-size-fits-all approach that can be applied to many different types of cryptosystems.
Book

Elliptic Curves and Their Applications to Cryptography: An Introduction

TL;DR: This chapter discusses the group law on Elliptic Curves over Finite Fields and the Discrete Logarithm Problem, and some of theorems related to this problem.
Book

J2ME: The Complete Reference

Jim Keogh
TL;DR: This comprehensive resource covers J2ME architecture and explains how to build applications and services for cell phones and PDAs with J2 ME.
BookDOI

Wireless internet handbook: technologies, standards, and application

TL;DR: This paper presents a meta-analysis of the literature on WAP, WAP-enabled Transaction Processing Model for Mobile Database Systems, and its applications in the field of mobile telecommunications.
Related Papers (5)