2019 Innovations in Power and Advanced Computing Technologies (I-Pact) 2019
DOI: 10.1109/i-pact44901.2019.8960235
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Encryption Techniques to Protect the Patient Privacy in Health Care Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…However, a specific method for the data protection with wearable device has not yet been established due to the variation, various characteristics, and small size of smart wearable devices. Therefore, an access control system based on encryption was required to preserve the security of patient health data (Khandare et al, 2019). Stine and Dang (2011) suggested that if there is a chance that an unauthorized individual could access any patient health information that has to be kept confidential, it should be encrypted.…”
Section: • Encryption Of Patient Health Informationmentioning
confidence: 99%
“…However, a specific method for the data protection with wearable device has not yet been established due to the variation, various characteristics, and small size of smart wearable devices. Therefore, an access control system based on encryption was required to preserve the security of patient health data (Khandare et al, 2019). Stine and Dang (2011) suggested that if there is a chance that an unauthorized individual could access any patient health information that has to be kept confidential, it should be encrypted.…”
Section: • Encryption Of Patient Health Informationmentioning
confidence: 99%
“…To reduce the vulnerability of computers and customers in a network, organizations could choose from a variety of products or a combination of them to secure their networks [6]. These tools include encryption authentication mechanisms, intrusion detection, security management and firewalls [7]. Aside from electronic commerce websites with questionable practices, some online storefronts that are scammers posing as retailers to steal credit card and other personal information [8].…”
Section: Related Workmentioning
confidence: 99%