AGE: authentication in gadget-free healthcare environments

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Panel: Authentication in Constrained Environments

This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-written notes. Mike Burmester (M. B.): We are having a talk here, on the topic of authentication on constrained environments. The panelists could take it into any direction they find interesting. I chose this topic because it is alm...

متن کامل

Persistent Authentication in Smart Environments

Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based information, e.g., it is common to have swipe card terminals placed next to doors to restricted ar...

متن کامل

Distortion-Free Authentication Watermarking

In this paper we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism based on the Abstract Interpretation framework.

متن کامل

Randomized and Efficient Authentication in Mobile Environments

In a mobile environment, a number of users act as a network nodes and communicate with one another to acquire location based information and services. This emerging paradigm has opened up new business opportunities and enables numerous applications such as road safety enhancement, service recommendations and mobile entertainment. A fundamental issue that impacts the success of these application...

متن کامل

Device Authentication In Wireless And Pervasive Environments

Security can only be guaranteed as long as the hardware and other key parameters, including software components, secret keys etc, of a device remain genuine and unmodified. Under this context, device authentication must be considered as a key security issue, complementary and of equal importance to user authentication, in today’s wireless and forthcoming ubiquitous realms. This paper classifies...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information Technology and Management

سال: 2019

ISSN: 1385-951X,1573-7667

DOI: 10.1007/s10799-019-00306-z