• [email protected]
  • +971 507 888 742
Submit Manuscript
SciAlert
  • Home
  • Journals
  • Information
    • For Authors
    • For Referees
    • For Librarian
    • For Societies
  • Contact
  1. International Journal of Pharmacology
  2. Vol 6 (6), 2010
  3. 954-958
  • Online First
  • Current Issue
  • Previous Issues
  • More Information
    Aims and Scope Editorial Board Guide to Authors Article Processing Charges
    Submit a Manuscript

International Journal of Pharmacology

Year: 2010 | Volume: 6 | Issue: 6 | Page No.: 954-958
DOI: 10.3923/ijp.2010.954.958

Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Article Trend



Total views 337

Authors


Hamdan O. Alanizi

Country: Malaysia

M.L. Mat Kiah

Country: Malaysia

A.A. Zaidan

Country: Malaysia

B.B. Zaidan

Country: Malaysia

Gazi Mahabubul Alam

Country: Malaysia

Keywords


  • Electronic medical records
  • confidentiality
  • non-repudiation
  • PKI
  • AES
  • Ntru
Research Article

Secure Topology for Electronic Medical Record Transmissions

Hamdan O. Alanizi, M.L. Mat Kiah, A.A. Zaidan, B.B. Zaidan and Gazi Mahabubul Alam
In this study, handshake protocol for patient, medical center and doctor, medical center is proposed for electronic medical record transmission to improve the confidentiality of data transmission and non-repudiation of sending and receiving medical records. The proposed topology depends on symmetric and asymmetric cryptography to achieve high level of secrecy for electronic medical records. The new topology has been described on multi-users (i.e., Doctors and Patient). The new topology has been implemented using Ntru crypto-system and AES encryption method. The proposed solution has been tested to have high level of confidentiality up to the legal age of the medical records.
PDF Fulltext XML References Citation

How to cite this article

Hamdan O. Alanizi, M.L. Mat Kiah, A.A. Zaidan, B.B. Zaidan and Gazi Mahabubul Alam, 2010. Secure Topology for Electronic Medical Record Transmissions. International Journal of Pharmacology, 6: 954-958.

DOI: 10.3923/ijp.2010.954.958

URL: https://scialert.net/abstract/?doi=ijp.2010.954.958

Related Articles

Coded Crypted Converted Hiding (C3H)-A Stego Channel
Steganography-Time to Time: A Review
Securing m-Government Transmission Based on Symmetric and Asymmetric Algorithms: A Review
Random Image Steganography and Steganalysis: Present Status and Future Directions
A Review on Multimedia Communications Cryptography
Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview
Video Compression Techniques: An Overview
A Novel Embedding Method to Increase Capacity and Robustness of Low-bit Encoding Audio Steganography Technique Using Noise Gate Software Logic Algorithm
Hiding Data in Video File: An Overview
An Accurate Method to Obtain Bio-Metric Measurements for Three Dimensional Skull

Leave a Comment


Your email address will not be published. Required fields are marked *

Useful Links

  • Journals
  • For Authors
  • For Referees
  • For Librarian
  • For Socities

Contact Us

Office Number 1128,
Tamani Arts Building,
Business Bay,
Deira, Dubai, UAE

Phone: +971 507 888 742
Email: [email protected]

About Science Alert

Science Alert is a technology platform and service provider for scholarly publishers, helping them to publish and distribute their content online. We provide a range of services, including hosting, design, and digital marketing, as well as analytics and other tools to help publishers understand their audience and optimize their content. Science Alert works with a wide variety of publishers, including academic societies, universities, and commercial publishers.

Follow Us
© Copyright Science Alert. All Rights Reserved