2017
DOI: 10.1109/access.2017.2752176
|View full text |Cite
|
Sign up to set email alerts
|

A proposal to improve the authentication process in m-health environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1

Relationship

3
6

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 47 publications
0
9
0
Order By: Relevance
“…For this reason, any company or medical institution that uses wearable devices to monitor and save medical parameters of its patients should seek solutions, together with their creators, in order not to lose information and confidentiality of use [37][38][39]. Different investigations have analysed users' perception about the possible loss of privacy of their medical data when using wearable devices.…”
Section: Development Of Instruments To Measure the Acceptance Ofmentioning
confidence: 99%
See 1 more Smart Citation
“…For this reason, any company or medical institution that uses wearable devices to monitor and save medical parameters of its patients should seek solutions, together with their creators, in order not to lose information and confidentiality of use [37][38][39]. Different investigations have analysed users' perception about the possible loss of privacy of their medical data when using wearable devices.…”
Section: Development Of Instruments To Measure the Acceptance Ofmentioning
confidence: 99%
“…erefore, according to different authors, it is necessary to focus on increasing confidentiality and the avoidance of possible hacks to lose information [37]. One of the possible solutions to introduce this identification and authentication could be biometric science, specifically facial authentication [61].…”
mentioning
confidence: 99%
“…This unknown classification also referred as 'impossible to classify' output by other authors is quite common in classification and authentication literature. For example, frequently facial-authentication applications neither can verify or reject a person identity if they are not able to properly detect the faces [24]. In our experimental results, we observed that all the normal usages were classified either as normal usages (96.5% of the cases) or as unknown (i.e.…”
Section: Discussionmentioning
confidence: 70%
“…One limitation of the current version of the SC is that it is based on the assumption that there is only one person using the SC to reliably measure their memory. We plan to overcome this limitation by including an identification mechanism, which could either be (1) facial identification with a low-cost camera following our previous work in facial authentication [26] or (2) radio-frequency identification, which would require the user to carry a card for the identification. We will select one of these options considering economic aspects, technological reliability, and user experience.…”
Section: Discussionmentioning
confidence: 99%