Vetenskap & teknik
Pocket
A Survey on the Two Factor Authentication Protocol used in the Telecare Medical Information System, including possible attack scenarios
Kishan Makadia • Nishant Doshi • Sunil Vithlani
759:-
Uppskattad leveranstid 3-8 arbetsdagar
Fri frakt för medlemmar vid köp för minst 249:-
Literature Review from the year 2015 in the subject Engineering - Computer Engineering, grade: 8.5, Marwadi Education Foundation (Gujarat Technological University), course: Master of Computer Engineering, language: English, abstract: Since the last few decades, there is a drastic increase in the availability of lower-cost telecommunications systems and healthcare services. The telecare medicine information system supports health-care delivery services. These systems are moving towards an automated environment, where automatic patient medical records and electronically interconnected telecare facilities are prevalent. It is important to guarantee the privacy and the security of the users in the telecare medicine information system. A secure authentication scheme will provide to safeguard data integrity, confidentiality, and availability. Efficient authentication is a prerequisite the guarantying the security and privacy of patients in Telecare Medical Information System. Authentication is used to verify the validity of the patients and Telecare Medical Information System server during remote access.
- Format: Pocket/Paperback
- ISBN: 9783668151444
- Språk: Engelska
- Antal sidor: 34
- Utgivningsdatum: 2016-03-02
- Förlag: Grin Verlag