2014
DOI: 10.1007/s10660-014-9154-3
|View full text |Cite
|
Sign up to set email alerts
|

Towards a cooperative security system for mobile-health applications

Abstract: Mobile Health (m-Health) system architectures are typically based on mobile and wireless communications, and use mobile devices with data exchange supported by Web Services (WS). Although m-Health systems offer mobility as a potential and precious resource they also present several challenged issues and constraints, such as, battery and storage capacity, broadcast constraints, interferences, disconnections, noises, limited bandwidths, and network delays. Furthermore, constant mobility and often-required Intern… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 53 publications
0
6
0
2
Order By: Relevance
“…Silva et al [18] presented a cryptographic scheme to guarantee confidentiality, integrity, and authenticity of data in mHealth applications. The authors proposed a hybrid approach using symmetric and asymmetric encryption algorithms.…”
Section: Privacy-preserving Using Blockchainmentioning
confidence: 99%
See 1 more Smart Citation
“…Silva et al [18] presented a cryptographic scheme to guarantee confidentiality, integrity, and authenticity of data in mHealth applications. The authors proposed a hybrid approach using symmetric and asymmetric encryption algorithms.…”
Section: Privacy-preserving Using Blockchainmentioning
confidence: 99%
“…For example, to achieve the same level of security as an elliptic curve cryptosystem with a 256-bit key (used in our paper), RSA needs a 3072-bit key [19] [20]. Due to the size of the key and the time required for processing, algorithms based on modular arithmetic, such as RSA, may make the scheme proposed in [18] unsuitable for mHealth systems with resource-limited devices.…”
Section: Privacy-preserving Using Blockchainmentioning
confidence: 99%
“…DE4MHA, simetrik ve asimetrik şifreleme algoritmaları kullanarak karma bir yaklaşım kullanır. Bu çalışmada m-sağlık ağ mimarisi için en uygun simetrik algoritmanın AES olduğu, ağ senaryoları için en uygun asimetrik algoritmanın RSA olduğu ve web servisleriyle iletişim için HTTPS protokolünün en uygun güvenlik mekanizması olduğu ortaya çıkmıştır [28].…”
Section: E-sağlıkta Güvenlik çöZümleriunclassified
“…• Sağlık profesyonelleri İlaç Hatırlatıcı: Özellikle gün içinde birden fazla ilaç alması gereken hastalar için hatırlatıcı özellikler içeren uygulamaları ifade etmektedir (10).…”
Section: Mobi̇l Sağlik (M-sağlik)unclassified