Gå direkt till innehållet
Survey on the Two Factor Authentication Protocol used in  the Telecare Medical Information System, including possible attack scenarios
Survey on the Two Factor Authentication Protocol used in  the Telecare Medical Information System, including possible attack scenarios
Spara

Survey on the Two Factor Authentication Protocol used in the Telecare Medical Information System, including possible attack scenarios

Läs i Adobe DRM-kompatibel e-boksläsareDen här e-boken är kopieringsskyddad med Adobe DRM vilket påverkar var du kan läsa den. Läs mer
Literature Review from the year 2015 in the subject Engineering - Computer Engineering, grade: 8.5, Marwadi Education Foundation (Gujarat Technological University), course: Master of Computer Engineering, language: English, abstract: Since the last few decades, there is a drastic increase in the availability of lower-cost telecommunications systems and healthcare services. The telecare medicine information system supports health-care delivery services. These systems are moving towards an automated environment, where automatic patient medical records and electronically interconnected telecare facilities are prevalent. It is important to guarantee the privacy and the security of the users in the telecare medicine information system. A secure authentication scheme will provide to safeguard data integrity, confidentiality, and availability. Efficient authentication is a prerequisite the guarantying the security and privacy of patients in Telecare Medical Information System. Authentication is used to verify the validity of the patients and Telecare Medical Information System server during remote access.
ISBN
9783668151437
Språk
Engelska
Utgivningsdatum
2016-02-16
Tillgängliga elektroniska format
  • PDF - Adobe DRM
Läs e-boken här
  • E-boksläsare i mobil/surfplatta
  • Läsplatta
  • Dator