• 1
    Lee WB, Lee CD. A cryptographic key management solution for HIPAA privacy–security regulations. IEEE Transactions on Information Technology in Biomedicine 2008; 12(1):3441.
  • 2
    Chao HM, Twu SH, Hsu CM. A secure identification access control scheme for accessing healthcare information systems. International IEEE EMBS Special Topic Conference on Information Technology Applications in Biomedicine. 2003; 122–25.
  • 3
    Reichertz PL. Hospital information systems—past, present, future. International Journal of Medical Informatics 2006; 75(3-4):282299.
  • 4
    NIST. The Digital Signature Standard. Communications of the ACM. 1992; 35(7): 3640.
  • 5
    Proposed Federal Information Processing. Standard for Digital Signature Standard. Federal Register 1991; 56(169): 4298042982.
  • 6
    Dwivedi A, Bali RK, Belsis MA, Naguib RNG, Every P, Nassar NS. Towards a practical healthcare information security model for healthcare institutions. International IEEE EMBS Special Topic Conference on Information Technology Applications in Biomedicine. 2003; 114–117.
  • 7
    Hu Y, Sloman M, Lupu E, Keoh SL. Vesta: a secure and autonomic system for pervasive healthcare. Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare. 2009; 1–8.
  • 8
    Riedl B, Grascher V, Kolb M, Neubauer T. Economic and security aspects of applying a threshold scheme in e-health. The 3rd International Conference on Availability, Reliability and Security. 2008; 39–46.
  • 9
    Evans DC, Nichol WP, Perlin JB. Effect of the implementation of an enterprise-wide electronic health record on productivity in the veterans health administration. Health Economics, Policy, and Law 2006; 1:1631699.
  • 10
    Daglish D, Archer N. Electronic personal health record systems: a brief review of privacy, security, and architectural issues. CONGRESS '09. World Congress on Privacy, Security, Trust and the Management of e-Business. 2009; 110–120.
  • 11
    Breaux TD, Anton AI. Analyzing regulatory rules for privacy and security requirements. IEEE Transactions on Software Engineering 2008; 34(1):520.
  • 12
    Coatrieux G, Puentes J, Lecornu L, Le Rest CC, Roux C. Compliant secured specialized electronic patient record platform. D2H2. The 1st Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare. 2006; 156–159.
  • 13
    MacKinnon W, Wasserman M. Integrated electronic medical record systems: critical success factors for implementation. The 42nd Hawaii International Conference on System Sciences (HICSS '09). 2009; 1–10.
  • 14
    Al-Salqan YY. Security and confidentiality in healthcare informatics. The 7th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE '98). 1998; 371–375.
  • 15
    Chang CC, Lee JS. On the design weakness of Chen-Huang dynamic access control mechanism. International Journal of Computer Science and Network Security 2005; 5(10):7983.
  • 16
    Chang CC, Lee JS. Security enhancement of Yang-Li hierarchical access control mechanism. Journal of Discrete Mathematical Sciences and Cryptography 2006; 9(3):573582.
  • 17
    Zhang JY, Lu XD, Duan HL, Nie HC. A medical information system architecture based on workflow technology. IEEE International Symposium on IT in Medicine & Education (ITIME '09) 2009; 1:11171121.
  • 18
    Huang EW, Liou DM. Performance analysis of a medical record exchanges model. IEEE Transactions on Information Technology in Biomedicine 2007; 11(2):153160.
  • 19
    Wang M, Lau C, Matsen FA, Kim Y. Personal health information management system and its application in referral management. IEEE Transactions on Information Technology in Biomedicine 2004; 8(3):287297.
  • 20
    Dalley A, Fulcher J, Bomba D, Lynch K, Feltham P. A technological model to define access to electronic clinical records. IEEE Transactions on Information Technology in Biomedicine 2005; 9(2):289290.
  • 21
    Lee WB, Chang CC. Efficient group signature scheme based on the discrete logarithm. IEE Proceedings – Computers and Digital Techniques 1998; 145(1):1518.
  • 22
    Harn L. Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proceedings – Computers and Digital Techniques 1994; 141(5):307313.
  • 23
    Harn L. Digital multisignature with distinguished signing authorities. Electronics Letters 1999; 35(4):294295.
  • 24
    Harn L. Batch verifying multiple RSA digital signatures. Electronics Letters 1998; 34(12):12191220.
  • 25
    Lee D. Hash function vulnerability index and hash chain attacks. The 3rd IEEE Workshop on Secure Network Protocols Workshop. 2007.
  • 26
    Lu R, Cao Z. Simple three-party key exchange protocol. Computer & Security 2007; 26:9497.
  • 27
    Davis RM. The data encryption standard in perspective. Computer Security and the Data Encryption Standard, National Bureau of Standards Special Publication. 1978.
  • 28
    NBS FIPS PUB 46, Data Encryption Standard. National Bureau of Standards, U.S. Department of Commerce. 1977.
  • 29
    NBS FIPS PUB 46-1, Data Encryption Standard. National Bureau of Standards, U.S. Department of Commerce. 1988.
  • 30
    Chang CC, Lin IC. Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Operating Systems Review 2004; 38(4):9196.
  • 31
    Afsar FA, Arif M, Hussain M. Fingerprint identification and verification system using minutiae matching. Proceedings of National Conference on Emerging Technologies 2004; 141–146.