Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    An Efficient Lightweight Authentication and Key Agreement Protocol for Patient Privacy

    Seyed Amin Hosseini Seno1, Mahdi Nikooghadam1, Rahmat Budiarto2,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3495-3512, 2021, DOI:10.32604/cmc.2021.019051

    Abstract Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers. In this system, service providers consider user authentication as a critical requirement. To address this crucial requirement, various types of validation and key agreement protocols have been employed. The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws. This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an efficient and robust lightweight authentication… More >

  • Open Access

    ARTICLE

    ALCencryption: A Secure and Efficient Algorithm for Medical Image Encryption

    Jiao Ge1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.3, pp. 1083-1100, 2020, DOI:10.32604/cmes.2021.013039

    Abstract With the rapid development of medical informatization and the popularization of digital imaging equipment, DICOM images contain the personal privacy of patients, and there are security risks in the process of storage and transmission, so it needs to be encrypted. In order to solve the security problem of medical images on mobile devices, a safe and efficient medical image encryption algorithm called ALCencryption is designed. The algorithm first analyzes the medical image and distinguishes the color image from the gray image. For gray images, the improved Arnold map is used to scramble them according to the optimal number of iterations,… More >

Displaying 1-10 on page 1 of 2. Per Page