Proceedings ArticleDOI
Implementation of Elliptic-Curve Cryptography on Mobile Healthcare Devices
K. Malhotra,S. Gardner,R. Patz +2 more
- pp 239-244
Reads0
Chats0
TLDR
The motivation for this paper was to formulate a secure protocol which comprises of signature, encryption and authentication (SEA) as a combined ingredient of secure remote patient monitoring application using mobile devices to be acceptable to both clinicians and patients.Abstract:
Over the past few years, much research attention has been afforded to the application of remote patient monitoring using embedded mobile devices. However, relatively little research has been done to investigate the security aspects of such scenarios. The present work describes the implementation of a cryptographic algorithm based on elliptic curves on an embedded mobile device useful for healthcare purposes. A personal digital assistant (PDA) has been chosen to be the hardware platform for the implementation as it is particularly suitable for remote patient monitoring applications. The motivation for this paper was to formulate a secure protocol which comprises of signature, encryption and authentication (SEA) as a combined ingredient of secure remote patient monitoring application using mobile devices. This needed to be easy to use and computationally efficient in order to be acceptable to both clinicians and patients and the results indicate a positive outcome.read more
Citations
More filters
[서평]「Applied Cryptography」
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI
Unobtrusive Sensing and Wearable Devices for Health Informatics
Yali Zheng,Xiaorong Ding,Carmen C. Y. Poon,Benny Lo,Heye Zhang,Xiao-Lin Zhou,Guang-Zhong Yang,Ni Zhao,Yuan-Ting Zhang +8 more
TL;DR: This paper aims to provide an overview of four emerging unobtrusive and wearable technologies, which are essential to the realization of pervasive health information acquisition, including: 1) unobTrusive sensing methods, 2) smart textile technology, 3) flexible-stretchable-printable electronics, and 4) sensor fusion.
Journal ArticleDOI
Monitoring patients via a secure and mobile healthcare system
TL;DR: Several techniques that can be used to monitor patients effectively and enhance the functionality of telemedicine systems are presented, and how current secure strategies can impede the attacks faced by wireless communications in healthcare systems and improve the security of mobile healthcare is discussed.
Journal ArticleDOI
Search Techniques for the Web of Things: A Taxonomy and Survey
TL;DR: This survey reviews the state-of-the-art search methods for the Web of Things, which are classified according to three different viewpoints: basic principles, data/knowledge representation, and contents being searched.
Journal ArticleDOI
A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes
Chia-Hui Wang,Yu-Shun Liu +1 more
TL;DR: This paper proposes a much stronger privacy protection for an end-to-end VoIP that applies not only the Elliptic-Curve Diffie-Hellman (ECDH) algorithm for key negotiation, but also the key generation function (KGF) for changing key dynamically in a VoIP call session.
References
More filters
[서평]「Applied Cryptography」
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Book
Elliptic Curve Public Key Cryptosystems
Alfred Menezes,Neal Koblitz +1 more
TL;DR: In conclusion, the proposed solution to the Elliptic Curve Logarithm Problem is a simple one-size-fits-all approach that can be applied to many different types of cryptosystems.
Book
Elliptic Curves and Their Applications to Cryptography: An Introduction
TL;DR: This chapter discusses the group law on Elliptic Curves over Finite Fields and the Discrete Logarithm Problem, and some of theorems related to this problem.
Book
J2ME: The Complete Reference
TL;DR: This comprehensive resource covers J2ME architecture and explains how to build applications and services for cell phones and PDAs with J2 ME.
BookDOI
Wireless internet handbook: technologies, standards, and application
Borko Furht,Mohammad Ilyas +1 more
TL;DR: This paper presents a meta-analysis of the literature on WAP, WAP-enabled Transaction Processing Model for Mobile Database Systems, and its applications in the field of mobile telecommunications.
Related Papers (5)
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
End-to-end security implementation for mobile devices using TLS protocol
Baris Kayayurt,Tugkan Tuglular +1 more