Author of the publication

Security Privacy and Policy for Cryptographic Based Electronic Medical Information System.

, , , , and . Sensors, 21 (3): 713 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent., , , and . AINA Workshops, page 650-655. IEEE Computer Society, (2008)The Enhancement of Security in Healthcare Information Systems., , , and . J. Medical Systems, 36 (3): 1673-1688 (2012)Design of a Wireless Sensor Network Platform for Tele-Homecare., and . Sensors, 13 (12): 17156-17175 (2013)A case study in designing Chinese metadata., , , and . Online Information Review, 24 (3): 229-234 (2000)Security Privacy and Policy for Cryptographic Based Electronic Medical Information System., , , , and . Sensors, 21 (3): 713 (2021)Confidentiality Protection of Digital Health Records in Cloud Computing., , , , , , and . J. Medical Systems, 40 (5): 124:1-124:12 (2016)Threshold Signature Scheme Resistible for Conspiracy Attack., , , and . PDCAT, page 479-483. IEEE Computer Society, (2006)Efficient migration for mobile computing in distributed networks., , , , and . Computer Standards & Interfaces, 31 (1): 40-47 (2009)Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent., , , and . MUE, page 189-196. IEEE Computer Society, (2009)A Mobile Agent Approach for Secure Integrated Medical Information Systems., , , , and . J. Medical Systems, 36 (5): 2731-2741 (2012)