A Survey on the Two Factor Authentication Protocol used in  the Telecare Medical Information System including possible attack scenarios

About The Book

Literature Review from the year 2015 in the subject Engineering - Computer Engineering grade: 8.5 Marwadi Education Foundation (Gujarat Technological University) course: Master of Computer Engineering language: English abstract: Since the last few decades there is a drastic increase in the availability of lower-cost telecommunications systems and healthcare services. The telecare medicine information system supports health-care delivery services. These systems are moving towards an automated environment where automatic patient medical records and electronically interconnected telecare facilities are prevalent. It is important to guarantee the privacy and the security of the users in the telecare medicine information system. A secure authentication scheme will provide to safeguard data integrity confidentiality and availability. Efficient authentication is a prerequisite the guarantying the security and privacy of patients in Telecare Medical Information System. Authentication is used to verify the validity of the patients and Telecare Medical Information System server during remote access.
Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
downArrow

Details


LOOKING TO PLACE A BULK ORDER?CLICK HERE