2021
DOI: 10.24251/hicss.2021.463
|View full text |Cite
|
Sign up to set email alerts
|

Online at Will: A Novel Protocol for Mutual Authentication in Peer-to-Peer Networks for Patient-Centered Health Care Information Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(11 citation statements)
references
References 0 publications
0
11
0
Order By: Relevance
“…An effective IAS addresses security issues such as Sybil attacks, poisoning attacks, pollution attacks, and MitM attacks [ 65 , 81 , 140 ] and is essential for health care information systems [ 2 , 30 ]. By authenticating users and resources shared, the origin of pollution or poisoning attacks can be traced, and the attackers can be held accountable.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…An effective IAS addresses security issues such as Sybil attacks, poisoning attacks, pollution attacks, and MitM attacks [ 65 , 81 , 140 ] and is essential for health care information systems [ 2 , 30 ]. By authenticating users and resources shared, the origin of pollution or poisoning attacks can be traced, and the attackers can be held accountable.…”
Section: Discussionmentioning
confidence: 99%
“…Individual PHS providers leveraging an effective IAS can strengthen security, which has the potential to increase patients’ intention to use P2P PHSs. In Germany, the German HTI planned to provide user authentication through smart cards as a security measure for PHS providers [ 65 , 141 ]. However, the introduction of national HTIs often leads to ambiguous, expensive, and protracted projects [ 65 , 141 ].…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations