• Open Daily: 10am - 10pm
    Alley-side Pickup: 10am - 7pm

    3038 Hennepin Ave Minneapolis, MN
    612-822-4611

Open Daily: 10am - 10pm | Alley-side Pickup: 10am - 7pm
3038 Hennepin Ave Minneapolis, MN
612-822-4611
A Survey on the Two Factor Authentication Protocol used in the Telecare Medical Information System, including possible attack scenarios

A Survey on the Two Factor Authentication Protocol used in the Telecare Medical Information System, including possible attack scenarios

Paperback

Technology & Engineering

ISBN10: 366815144X
ISBN13: 9783668151444
Publisher: Grin Verlag
Published: Mar 2 2016
Pages: 34
Weight: 0.13
Height: 0.08 Width: 5.83 Depth: 8.27
Language: English
Literature Review from the year 2015 in the subject Engineering - Computer Engineering, grade: 8.5, Marwadi Education Foundation (Gujarat Technological University), course: Master of Computer Engineering, language: English, abstract: Since the last few decades, there is a drastic increase in the availability of lower-cost telecommunications systems and healthcare services. The telecare medicine information system supports health-care delivery services. These systems are moving towards an automated environment, where automatic patient medical records and electronically interconnected telecare facilities are prevalent. It is important to guarantee the privacy and the security of the users in the telecare medicine information system. A secure authentication scheme will provide to safeguard data integrity, confidentiality, and availability. Efficient authentication is a prerequisite the guarantying the security and privacy of patients in Telecare Medical Information System. Authentication is used to verify the validity of the patients and Telecare Medical Information System server during remote access.

Also in

Technology & Engineering