2019 International Conference on Computing, Computational Modelling and Applications (ICCMA) 2019
DOI: 10.1109/iccma.2019.00027
|View full text |Cite
|
Sign up to set email alerts
|

A Decentralized Cryptographic Blockchain Approach for Health Information System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…In addition to this, the study assessed and evaluated a number of cryptographic methods that could be useful in IoT deployments. Sosu et al [18] developed, constructed, and launched an architecture in which they attempted to leverage Public Key Infrastructure (PKI) and Hyperledger fabric to replicate healthcare process whilst assuring that patients' health files are under the absolute control of the patient exclusively. Moreover, the proxy reencryption was also used for providing access to others with the consent of patients.…”
Section: Literature Surveymentioning
confidence: 99%
“…In addition to this, the study assessed and evaluated a number of cryptographic methods that could be useful in IoT deployments. Sosu et al [18] developed, constructed, and launched an architecture in which they attempted to leverage Public Key Infrastructure (PKI) and Hyperledger fabric to replicate healthcare process whilst assuring that patients' health files are under the absolute control of the patient exclusively. Moreover, the proxy reencryption was also used for providing access to others with the consent of patients.…”
Section: Literature Surveymentioning
confidence: 99%
“…SHA-3 family is working based on keccak. SHA3-224 and SHA3-256 is responsible for 128 bits of security level [26]. SHA3-224 produces 64 bytes of hash output and SHA3-256 produces 96 bytes of hash output.…”
Section: Related Workmentioning
confidence: 99%
“…Brent and colleagues [20] presented 'Ethainter,' a security analyser for detecting smart contract composite vulnerabilities. The Ethainter outperformed other smart contract security analysis tools in contrast, according to the authors, because of its ability to blend completeness and accuracy.…”
Section: Other Techniquesmentioning
confidence: 99%
“…A blockchain is a distributed list of blocks, each of which is uniquely known by its cryptographic hash [20]. Each block contains a connection to the block preceding it, forming a chain of blocks.…”
Section: Blockchainmentioning
confidence: 99%