A course in computational algebraic number theory
A course in computational algebraic number theory
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The art of computer programming, volume 2 (3rd ed.): seminumerical algorithms
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Programming and Deploying Java Mobile Agents Aglets
Programming and Deploying Java Mobile Agents Aglets
Security Issues in Mobile Agent Technology
FTDCS '99 Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems
A Security Architecture for Mobile Agents in Ajanta
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
Cryptography and Network Security (4th Edition)
Cryptography and Network Security (4th Edition)
Wireless Communications & Mobile Computing
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Reducing inference control to access control for normalized database schemas
Information Processing Letters
Probabilistic algorithms in finite fields
SFCS '81 Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
Efficient migration for mobile computing in distributed networks
Computer Standards & Interfaces
Secure brokerage mechanisms for mobile electronic commerce
Computer Communications
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Journal of Systems and Software
Secure key management scheme for dynamic hierarchical access control based on ECC
Journal of Systems and Software
An agent-based English auction protocol using Elliptic Curve Cryptosystem for mobile commerce
Expert Systems with Applications: An International Journal
A Study on Agent-Based Secure Scheme for Electronic Medical Record System
Journal of Medical Systems
Mobile Agent Application and Integration in Electronic Anamnesis System
Journal of Medical Systems
An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System
Journal of Medical Systems
Deployment of Secure Mobile Agents for Medical Information Systems
Journal of Medical Systems
A Mobile Agent Approach for Secure Integrated Medical Information Systems
Journal of Medical Systems
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
Information Sciences: an International Journal
Hi-index | 0.00 |
Recently several efficient schemes are proposed to provide security of e-medicine systems. Almost all of these schemes have tried to achieve the highest security level in transmission of patients' medical information to medical institutions through a heterogeneous network like Internet. In this paper, we explain the insecurity of these schemes against "man-in-the-middle" attack. Furthermore, a dynamic mobile agent system based on hybrid cryptosystem is proposed that is both secure and also efficient in computation cost. Analyzing the security criteria confirms suitability of the proposed scheme for e-medicine systems.