An Improved Authentication Protocol in Telemedicine System

Author(s):  
Lijuan Zheng ◽  
Yunjia Zhang ◽  
Rui Zhang ◽  
Jianyou Chen ◽  
Meng Cui ◽  
...  
2020 ◽  
pp. 52-58 ◽  
Author(s):  
A. A. Eryomenko ◽  
N. V. Rostunova ◽  
S. A. Budagyan ◽  
V. V. Stets

The experience of clinical testing of the personal telemedicine system ‘Obereg’ for remote monitoring of patients at the intensive care units of leading Russian clinics is described. The high quality of communication with the remote receiving devices of doctors, the accuracy of measurements, resistance to interference from various hospital equipment and the absence of its own impact on such equipment were confirmed. There are significant advantages compared to stationary patient monitors, in particular, for intra and out-of-hospital transportation of patients.


2020 ◽  
pp. 44-49
Author(s):  
A. A. Eryomenko ◽  
N. V. Rostunova ◽  
S. A. Budagyan ◽  
L. S. Sorokina

The article describes the experience of clinical testing of the personal telemedicine system (PTS) ‘Obereg’ for remote monitoring of patients with the consequences of severe conditions in leading Russian clinics. It is shown that such patients are at high risk of complications when transferred from the ICU to a normal ward with limited medical supervision and lack of instrumentation. The use of remote monitoring using the personal telemedicine system ‘Obereg’ allows to solve this problem. The results of the use of PTS ‘Obereg’ for the organization of monitoring in the home patronage of patients with limited mobility are presented. It is indicated that such devices should be used in an emergency situation similar to a coronavirus pandemic to monitor patients who are in infectious boxes and on home treatment.


2019 ◽  
Vol 15 (4) ◽  
pp. 784-794
Author(s):  
N.V. Kormil'tsev ◽  
◽  
A.D. Uvarov ◽  
A.A. Mikhailov ◽  
M.V. Tumbinskaya ◽  
...  

2019 ◽  
Vol 7 (5) ◽  
pp. 1551-1557
Author(s):  
Arif Mohammad Abdul ◽  
Sudarson Jena ◽  
M Bal Raju

2017 ◽  
Vol 9 (1) ◽  
pp. 30-35
Author(s):  
Sunderi Pranata ◽  
Hargyo Tri Nugroho ◽  
Hirofumi Yamaki

It is known that password itself is not enough for formidable authentication method since it has a lot of vulnerabilities. Multi factor authentication (MFA) is introduced for the next generation for good authentication to address that issue. MFA combines two or more of three principles of good security, “something you know”, “something you have”, and “something you are”. Most MFA mechanisms work as one time passwords (OTP). However, they can still be vulnerable to phishing and MiTM attack. On top of that, OTP can be hard to use as it requires user to input another password given by the device (SMS, token, authenticator). Implemented in small USB U2F device, FIDO U2F delivers easier yet stronger security on authentication process which implements public key cryptography, challenge-response protocol, and phishing and MitM protection.  Index Terms— Authentication protocol, FIDO U2F, Multi factor authentication, OTP


2013 ◽  
Vol 33 (5) ◽  
pp. 1350-1352
Author(s):  
Peng LIU ◽  
Changhong ZHANG ◽  
Qingyu OU

Sign in / Sign up

Export Citation Format

Share Document