Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Security analysis of the palm operating system and its weaknesses against malicious code threats
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Providing web services to mobile users: the architecture design of an m-service portal
International Journal of Mobile Communications
On the usability of mobile commerce
International Journal of Mobile Communications
International Journal of Mobile Communications
Mobile commerce: its market analyses
International Journal of Mobile Communications
Mobile healthcare computing devices for enterprise-wide patient data delivery
International Journal of Mobile Communications
Security analysis of michael: the IEEE 802.11i message integrity code
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Secure human face authentication for mobile e-government transactions
International Journal of Mobile Communications
Hi-index | 0.00 |
In this paper we will outline the importance of mobile data communication in healthcare, accessibility of health information through mobile devices, and information security of personal health information. Firstly, we illustrate issues and importance of securing personal health information in mobile environment. Then we proceed with a novel idea of authenticating the health information in mobile environment by incorporating the concept of short signature schemes. The resulting notion is extremely efficient and it requires a very short signature to perform the authenticity function for the health information stored in the mobile devices.