Skip navigation

DSpace JSPUI

DSpace preserves and enables easy and open access to all types of digital content including text, images, moving images, mpegs and data sets

Learn More
DSpace logo
English
中文
  • Browse
    • Communities
      & Collections
    • Publication Year
    • Author
    • Title
    • Subject
    • Advisor
  • Search TDR
  • Rights Q&A
    • My Page
    • Receive email
      updates
    • Edit Profile
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊工程學系
Please use this identifier to cite or link to this item: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/48145
Full metadata record
???org.dspace.app.webui.jsptag.ItemTag.dcfield???ValueLanguage
dc.contributor.advisor賴飛羆
dc.contributor.authorZhen-Yu Wuen
dc.contributor.author吳鎮宇zh_TW
dc.date.accessioned2021-06-15T06:47:17Z-
dc.date.available2013-07-06
dc.date.copyright2011-07-06
dc.date.issued2011
dc.date.submitted2011-06-07
dc.identifier.citation[1] C.-M. Yang, H.-C. Lin, P. Chang, and W. S. Jian, Taiwan’s perspective on electronic medical records’ security and privacy protection: Lessons learned from HIPAA, Computer Methods and Programs in Biomedicine, Vol. 82, No. 3, pp. 277-282, 2006.
[2] D. Gammon, E. Arsand, O. A. Walseth, N. Andersson, M. Jenssen, and T. Taylor, Parent-child interaction using a mobile and wireless system for blood glucose monitoring, Journal of Medical Internet Research, Vol. 7, No. 5, pp. e57, 2005.
[3] W. B. Lee and C. D. Lee, A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations, IEEE Transactions on Information Technology in Biomedicine, Vol. 12, No. 1, pp. 34-41, 2008.
[4] Z. Y. Wu, Y. F. Chung, F. Lai, T. S. Chen, and H. C. Lee, An Enhanced Password-based User Authentication Scheme for Grid Computing, International Journal of Innovative Computing, Information and Control, Vol. 7, No. 7, June 2011.
[5] Z. Y. Wu, Y. C. Lee, F. Lai, H. C. Lee, and Y. F. Chung, A Secure Authentication Scheme for Telecare Medicine Information Systems, Journal of Medical Systems, Available online Oct. 27, 2010. (DOI: 10.1007/s10916-010-9614-9)
[6] Z. Y. Wu, Y. F. Chung, F. Lai, and T. S. Chen, A Password-based User Authentication Scheme for the Integrated EPR Information System, Journal of Medical Systems, Available online May 27, 2010. (DOI: 10.1007/s10916-010-9527-7)
[7] J.-S. Lee, Y.-F. Chang and C.-C. Chang, A novel authentication protocol for multi-server architecture without smart cards, International Journal of Innovative Computing, Information and Control, Vol. 4, No. 6, pp. 1357-1364, 2008.
[8] C.-C. Chang, J.-S. Lee and J.-Y. Kuo, Time-bound Based Authentication Scheme for Multi-server Architecture, International Journal of Innovative Computing, Information and Control, Vol. 4, No. 11, pp. 2987-2996, 2008.
[9] R.-C. Wang, W.-S. Juang and C.-L. Lei, A Robust Authentication Scheme with User Anonymity for Wireless Environments, International Journal of Innovative Computing, Information and Control, Vol. 5, No. 4, pp. 1069-1080, 2009.
[10] C.-L. Chen, Y.-Y. Chen and Y.-H. Chen, Group-based Authentication to Protect Digital Content for Business Applications, International Journal of Innovative Computing, Information and Control, Vol. 5, No. 5, pp. 1243-1251, 2009.
[11] M. Holbl, T. Welzer and B. Brumen, Improvement of the Peyravian-Jeffries’s user authentication protocol and password change protocol, Computer Communications, Vol. 31, No. 10, pp. 1945-1951, 2008.
[12] L. Wu, Y. Zhang and F. Wang, A new provably secure authentication and key agreement protocol for SIP using ECC, Computer Standards and Interfaces, Vol. 31, No. 2, pp. 286-291, 2009.
[13] K.-H. Yeh and N. W. Lo, A novel remote user authentication scheme for multi-server environment without using smart cards, International Journal of Innovative Computing, Information and Control, Vol. 6, No. 8, pp. 3467-3478, 2010.
[14] N. W. Lo and K.-H. Yeh, A novel authentication scheme for mobile commerce transactions, International Journal of Innovative Computing, Information and Control, Vol. 6, No. 7, pp. 3093-3103, 2010.
[15] W.-G. Shieh and M.-T. Wang, An improvement to Kim-Chung’s authentication scheme, ICIC Express Letters, Vol. 3, No.4B, pp. 1215-1220, 2009.
[16] J.-F. Lin, List scheduling multiprocessor tasks in grid computing environments, ICIC Express Letters, Vol. 4, No.1, pp. 245-248, 2010.
[17] C.H. Lin, and Y.Y. Lai, A flexible biometrics remote user authentication scheme, Computer Standards and Interfaces, Vol. 27, No. 1, pp. 19-23, 2004.
[18] N.Y. Lee, and Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards and Interfaces, Vol. 27, No. 2, pp. 177-180, 2005.
[19] Y.Y. Wang, J.Y. Liu, F.X. Xiao, J. Dan, A more efficient and secure dynamic ID-based remote user authentication scheme, Computer Communications, Vol. 32, No. 4, pp. 583-585, 2009.
[20] E. Yoon and K. Yoo, An efficient password authentication schemes without using the server public key for grid computing, GCC 2005, LNCS 3795, pp. 149-154, 2005.
[21] J. L. Tsai, Efficient Nonce-based Authentication Scheme for Session Initiation Protocol, International Journal of Network Security, Vol. 9, No. 1, pp. 12-16, 2009.
[22] H.-Y. Chien, J.-K. Jan, and Y.-M. Tseng, An efficient and practical solution to remote authentication: smart card, Computers & Security, Vol. 21, No. 4, pp. 372-375, 2002.
[23] R. Song, L. Korba, and G. Yee, Analysis of smart card-based remote user authentication schemes, Proceedings of the 2007 International Conference on Security and Management, pp. 323-329, 2007.
[24] M.L. Das, Two-factor user authentication in wireless sensor networks, IEEE Transactions on Wireless Communications, Vol. 8, No. 3, pp. 1086-1090, 2009.
[25] E. Liao, C. C. Lee, and M. S. Hwang, A password authentication scheme over insecure networks, Journal of Computer and System Sciences, Vol. 72, No. 4, pp. 727-740, 2006.
[26] C. Lambrinoudakis and S. Gritzalis, Managing medical and insurance information through a smart-card-based information system, Journal of Medical Systems, Vol. 24, No. 4, pp. 213-234, 2000.
[27] R. H. Dolin, L. Alschuler, C. Beebe, P. V. Biron, S. L. Boyer, D. Essin, E. Kimber, T. Lincoln, and J. E. Mattison, The HL7 Clinical Document Architecture, Journal of the American Medical Informatics Association, Vol. 8, No. 6, pp. 552-569, 2001.
[28] K. S. Um, Y. S. Kwak, H. Cho, and I. K. Kim, Development of an HL7 interface engine, based on tree structure and streaming algorithm, for large-size messages which include image data, Computer Methods and Programs in Biomedicine, Vol. 80, No. 2, pp. 126-140, 2005.
[29] X. O. Ping, L. F. Ko, R. J. Shang, and F. Lai, Dynamic Messages Creation Method for HL7 Based Healthcare Information System, HEALTHCOM 2007, 2007.
[30] J.-C. Hsieh, A novel DICOM-based 12-lead electrocardiogram documentary system, Journal of Electrocardiology, Vol. 40, pp. S81-S87, 2007.
[31] R. H. Dolin, W. Rishel, P. V. Biron, J. Spinosa, and J. E. Mattison, SGML and XML as Interchange Formats for HL7 Messages, Journal of the American Medical Informatics Association, pp. 720-724, 1998.
[32] M.J. McAuliffe, F.M. Lalonde, D. McGarry, W. Gandler, K. Csaky, and B.L. Trus, Medical Image Processing, Analysis and Visualization in clinical research, CBMS 2001. Proceedings. 14th IEEE Symposium, pp. 381-386, 2001.
[33] J. Pereira, A. Lamelo, and I. M. Vazquez-Naya, Design and implementation of a DICOM PACS with secure access via Internet, Proceedings of the 23rd Annual EMBS International Conference, pp. 3724-3727, 2001.
[34] R. Lu, Z. Cao, Z. Chai, and X. Liang, A simple user authentication scheme for grid computing, International Journal of Network Security, Vol. 7, No. 2, pp. 202-206, 2008.
[35] L.-J. Zhang and Q. Zhou, CCOA: Cloud Computing Open Architecture, ICWS 2009, pp. 607-616, 2009.
[36] I. Foster and C. Kesselman, The Grid: Blueprint for a new Computing Infrastructure, 2nd revised edition, Morgan Kaufmann Publishers In, 2003.
[37] S.W. Lee, H.S. Kim, and K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces, Vol. 27, No. 2, pp. 181-183, 2005.
[38] X.M. Wang, W.F. Zhang, J.S. Zhang, and M.K. Khan, Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards, Computer Standards and Interfaces, Vol. 29, No. 5, pp. 507-512, 2007.
[39] E.J. Yoon, E.K. Ryu, and K.Y. Yoo, Further improvement of an efficient password based remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 612-614, 2004.
[40] L. Lamport, Password authentication with insecure communication, Communications of the ACM, Vol. 24, No. 11, pp. 770-772, 1981.
[41] W. Stallings, Cryptography and Network Security: Principles and Practice, 4th Ed., Prentice Hall, 2005.
[42] T. ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, Vol. IT-31, No. 4, pp. 469-472, 1985.
[43] T. Huston, Security Issues for Implementation of E-Medical Records, Communications of the ACM, Vol. 44, No. 9, pp. 89-94, 2001.
[44] A. Cilardo, L. Coppolino, N. Mazzocca, and L. Romano, Elliptic curve cryptography engineering, Proceedings of the IEEE, Vol. 94, No. 2, pp. 395-406, 2006.
[45] M.A. Strangio, Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves, Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 324-331, 2005.
[46] N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, Vol. 48, No. 177, pp. 203-209.
[47] A.D. Fernandes, Elliptic-curve cryptography, Dr. Dobb's Journal, 1999.
[48] M. L. Das, A. Saxena and V. P. Gulati, A dynamic ID-based remote user authentication scheme, IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 629-631, 2004.
[49] W.C. Ku and S.M. Chen, Weaknesses and improvements of an efficient password base remote user authentication scheme using smartcards, IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, pp. 204-206, 2004.
[50] M. Peyravian and C. Jeffries, Secure remote user access over insecure networks, Computer Communications, Vol. 29, No. 5, pp. 660-667, 2006.
[51] C.C. Wu, W.B. Lee and W.J. Tsaur, A secure authentication scheme with anonymity for wireless communications, IEEE Communication Letter, Vol. 12, No. 10, pp. 722-723, 2008.
[52] C. C. Yang, R. C. Wang, and W. T. Liu, Secure authentication scheme for session initiation protocol, Computers & Security, Vol. 24, No. 5, pp. 381-386, 2005.
[53] J. Xu, W.T. Zhu, and D.G. Feng, An improved smart card based password authentication scheme with provable security, Computer Standards & Interfaces, Vol. 31, No. 4, pp. 723-728, 2009.
[54] J.Y. Liu, A.M. Zhou, and M.X. Gao, A new mutual authentication scheme based on nonce and smart cards, Computer Communications, Vol. 31, No. 10, pp. 2205-2209, 2008.
[55] M.S. Hwang, and L.H. Li, A new remote user authentication scheme using smart cards, IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, pp. 28-30, 2000.
[56] T. Hwang, Y. Chen, and C.S. Laih, Non-interactive password authentication without password tables, IEEE region 10 conference on computer and communication system, pp. 429-431, 1990.
[57] N. Haller, The S/KEY (TM) one-time password system, Proceedings of Internet Society Symposium on Network and Distributed System Security, Internet Society, pp. 151-158, 1994.
[58] N. Haller, The S/KEY one-time password system, RFC Technical Report 1760, February 1995.
[59] C.J. Mitchell, and L. Chen, Comments on the S/KEY user authentication scheme, ACM Operating Systems Review, Vol. 30, No. 4, pp. 12-16, 1996.
[60] A. Shimizu, A dynamic password authentication method by one-way function, IEICE Transactions on Information and Systems, Vol. J73-D-I, No. 7, pp. 630-636, 1990.
[61] C.L. Lin, H.M. Sun, and T. Hwang, Attacks and solutions on strong-password authentication, IEICE Transactions on Communications, Vol. E84-B, No. 9, pp. 2622-2627, 2001.
[62] M. Sandirigama, A. Shimizu, and M.T. Noda, Simple and secure password authentication protocol (SAS), IEICE Transactions on Communications, Vol. E83-B, No. 6, pp. 1363-1365, 2000.
[63] A. Shimizu, T. Horioka, H. Inagaki, A password authentication method for contents communication on the Internet, IEICE Transactions on Communications, Vol. E81-B, No. 8, pp. 1666-1763, 1998.
[64] C.-M. Chen, and W.-C. Ku, Stolen-verifier attack on two new strong-password authentication protocols, IEICE Transactions on Communications, Vol. E85-B, No. 11, pp. 2519-2521, 2002.
[65] S. M. Bellovin, and M. Merritt, Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks, Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, May 1992.
[66] S. M. Bellovin, and M. Merritt, Augmented Encrypted Key Exchange: A Password-Based Protocol Secure Against Dictionary Attacks and Password File Compromise, Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 244-250, 1993.
[67] C.-I. Fan, Y.-C. Chan, and Z.-K. Zhang, Robust remote authentication scheme with smart cards, Computers & Security, Vol. 24, No. 8, pp. 619-628, 2005.
[68] W.-S. Juang, Efficient multi-server password authenticated key agreement using smart cards, IEEE Transactions on Consumer Electronics, Vol. 50, No. 1, pp. 251-255, 2004.
[69] W.-S. Juang, Efficient password authenticated key agreement using smart cards, Computers & Security, Vol. 23, No. 2, pp. 167-173, 2004.
[70] W.-S. Juang, Efficient three-party key exchange using smart cards, IEEE Transactions on Consumer Electronics, Vol. 50, No. 2, pp. 619-624, 2004.
[71] W.-S. Juang, S.-T. Chen, and H.-T. Liaw, Robust and efficient password authenticated key agreement using smart cards, IEEE Transactions on Industrial Electronics, Vol. 55, No. 6, pp. 2551-2556, 2008.
[72] R.L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.
[73] A. Cavuşoğlu, and S. Gorgunoğlu, A fast fingerprint image enhancement algorithm using a parabolic mask, Computers and Electrical Engineering, Vol. 34, No. 3, pp. 250-256, 2008.
[74] S. Chikkerur, A. N. Cartwright, and V. Govindaraju, Fingerprint enhancement using STFT analysis, Pattern Recognition, Vol. 40, pp. 198-211, 2007.
[75] C. Wu, Z. Shi, and V. Govindaraju, Fingerprint image enhancement method using directional median filter, Proceedings of the SPIE, Vol. 5404, pp. 66-75, 2004.
[76] T. Nakamura, M. Hirooka, H. Fujiwara, and K. Sumi, Fingerprint image enhancement using a parallel ridge filter, Proceedings of the 17th international conference on pattern recognition (ICPR 2004), Cambridge, UK, Vol. 1, pp. 536-539, 2004.
[77] X. Tan, and B. Bhanu, A robust two step approach for fingerprint identification, Pattern Recognition Letters, Vol. 24, pp. 2127-2134, 2003.
[78] J. R. Lu, and W. C. Hsiao, Does Universal Health Insurance Make Health Care Unaffordable? Lessons From Taiwan, Health Affairs, Vol. 22, No. 3, pp. 77-88, 2003.
[79] M.-L. Lee, Health Care in Taiwan - Past, Present and Future, 54th World Health Assembly, May 2001.
[80] Y. N. Chen, Taiwan’s Health IC Smart Card Security and Privacy Policy, 2003. Available at http://www.martsoft.com/reference/healthcare/tw_nhi_2003Sep.pdf.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/48145-
dc.description.abstract在醫療領域中,隨著情境、地區的不同會衍生出不同的醫療環境。除了一般看病的醫院與診所外,還有病人危急狀態時所需要的急診、高山,離島偏遠地方因資源限制而建置設備較不完善的衛生所、以及醫院內部擁有的病歷管理中心。這些環境當中,無論是系統間或使用者間,都可能因為病人就診、臨床研究或是醫生查閱而需傳送有關病人受保護之健康資料。因此,確保這些資料可在網路上安全無疑的傳輸並保證這些資訊的隱私性與完整性是重要的議題。
驗證機制將運用來確保這些隱私資訊不被非法人員欺騙而獲得。並且,基於通行碼基礎的驗證機制因為密碼的有效率性而成為最被廣泛使用的方法。在這種機制之中,每個使用者都可在不需任何額外輔助的設備下,選擇往後機制驗證流程中自己使用的密碼並且可以牢記在心。
然而,在眾多醫療環境中,隨著環境的不同會有著不同的需求,因此一般的通行碼驗證機制並無法適用於這些特殊的醫療環境上。故此,本論文提出了三個基於不同形式的驗證機制,意即,系統式,使用者式以及行動式的驗證機制來滿足各種環境的需求。
這些機制不僅能抵抗各種惡意的網路攻擊,諸如通行碼猜測攻擊、重送攻擊、竊取伺服器驗證值攻擊、伺服器偽裝攻擊、或是偽冒攻擊等,而且能提供完美的前向安全性。
此外,為了證明這些機制確實能適用於醫療環境上,本論文亦說明它們可以符合健康保險可攜性與責任法案的安全規範。其為美國聯邦政府在1996年所制定的法案,是目前美國最重要的針對醫療資訊的法案。它主要是用來規範醫療資訊應用及病患的隱私權。該法案最重要的部分在於它所訂立的隱私與安全規範。隱私規範記載著有關病人如何理解與控制對於使用他們所受保護之健康資料的權力。而安全規範則是依照怎樣做是安全的與如何實際實行之需求準則與特殊規範來定義。對於建構一個安全的醫療環境,滿足隱私與安全兩大規範裡的法則是重要的。
zh_TW
dc.description.abstractIn medical domain, different medical environments would be generated with various contexts and regions, such as general hospitals and clinics, where people go for healthcare, emergency rooms, where patients in the crisis, deficient health centers in mountain, outlying islands, and remote areas, and the medical record management center in hospitals. In these environments, the protected medical information is likely to be transmitted among systems or users for patient treatments, clinical research, or doctor enquiry. The safe transmission on the network and the guarantee of the information privacy and integrity are the critical issue.
An authorization mechanism would be used to ensure the private information is not obtained fraudulently by illegal persons. The password-based authentication scheme is the most widely employed method because of its efficiency. Under such mechanism, each user is allowed to select his password and keep in mind without any additional assistant device for the further authentication process.
Nonetheless, different requirements are presented on various medical environments. General authentication schemes therefore cannot be applied to special medical environments. For this reason, this study proposes three authentication schemes, namely system-based, user-based, and mobility-based, for various environmental demands.
Not only various malicious attacks such as replay attacks, password guessing attacks, stolen-verifier attacks, server spoofing attacks, impersonation attacks can be resisted but also the perfect forward secrecy is preserved in these schemes.
In addition, this study further explains these schemes can conform to the security regulations of Health Insurance Portability and Accountability Act so that they are appropriate to be applied in medicine environments. Health Insurance Portability and Accountability Act, the law of United States Federal Government enacted in August 1996, is the most important Act for electronic medicine and is applied to standardize the medical information and applications, and the privacy of patients. The crucial part of the act comprises its privacy and security regulations. Privacy regulations address the patients’ rights to understand and control the use of their protected health information. Security regulations can be defined by requirement standards and specifications on what to do and how to do it. For constructing a secure medicine environment, satisfying both privacy and security rules are important.
en
dc.description.provenanceMade available in DSpace on 2021-06-15T06:47:17Z (GMT). No. of bitstreams: 1
ntu-100-D96922021-1.pdf: 1219843 bytes, checksum: ce2b074b0b980902ee6ff06b590f6388 (MD5)
Previous issue date: 2011
en
dc.description.tableofcontents口試委員會審定書 i
誌謝 ii
中文摘要 iii
Abstract v
List of figures 5
List of tables 6
Chapter 1 — Introduction 7
1.1 Motivations 7
1.2 Password authentication schemes 9
1.3 HIPPA security regulations 12
1.4 Organization of the dissertation 14
Chapter 2 — Mathematic backgrounds 16
2.1 One-way hash function 16
2.2 Bitwise operation 17
2.3 Discrete logarithm problem 18
2.4 Symmetric cryptosystem 18
2.5 Elliptic curve cryptosystem 19
Chapter 3 — System-based authentication scheme 25
3.1 Preface 25
3.2 Overview of Lu et al.'s scheme 26
3.2.1 Registration phase 27
3.2.2 Authentication phase 27
3.2.3 Password change phase 29
3.3 Weaknesses in Lu et al.’s scheme 30
3.4 Improved scheme 32
3.4.1 Registration phase 34
3.4.2 Authentication phase 34
3.4.3 Password change phase 37
3.4.4 Parameter regulation function 37
3.5 Analysis of security 37
3.5.1 Replay attacks 38
3.5.2 On-line password guessing attacks 38
3.5.3 Off-line password guessing attacks 39
3.5.4 Stolen-verifier attacks 39
3.5.5 Server spoofing attacks 40
3.5.6 Perfect forward secrecy 40
3.5.7 Impersonation attacks 40
3.6 Comparison 41
3.7 Summary 42
Chapter 4 — User-based authentication scheme 43
4.1 Preface 43
4.2 Proposed scheme 44
4.2.1 Registration phase 46
4.2.2 Login phase 46
4.2.3 Verification phase 47
4.2.4 Password change phase 49
4.2.5 Extra-condition: Authentication in emergency 49
4.3 Analysis of security 50
4.3.1 Password protection 51
4.3.2 Data transmission security 52
4.3.3 User masquerading detection 53
4.3.4 Server spoofing detection 54
4.4 Comparisons of performance 55
4.5 Summary 56
Chapter 5 — Mobility-based authentication scheme 57
5.1 Preface 57
5.2 Proposed scheme 58
5.2.1 Registration phase 59
5.2.2 Pre-computing phase 59
5.2.3 Authentication phase 61
5.2.4 Password change phase 63
5.2.5 Parameter transfer function 64
5.3 Analysis of security 64
5.3.1 Replay attacks 64
5.3.2 On-line password guessing attacks 65
5.3.3 Off-line password guessing attacks 65
5.3.4 Impersonation attacks 66
5.3.5 Stolen-verifier attacks 66
5.3.6 Security of session key 67
5.3.7 Perfect forward secrecy 67
5.4 Comparison 67
5.5 Summary 69
Chapter 6 — Discussion of three types of password-based user authentication schemes 70
6.1 Comparison 70
6.2 The authentication schemes satisfying HIPPA 74
Chapter 7 — Conclusions and future work 78
7.1 Conclusions 78
7.2 Future work 79
Bibliography 81
dc.language.isoen
dc.subject健康保險可攜性與責任法案zh_TW
dc.subject醫療環境zh_TW
dc.subject隱私性zh_TW
dc.subject完整性zh_TW
dc.subject驗證機制zh_TW
dc.subjectHealth Insurance Portability and Accountability Acten
dc.subjectMedical environmentsen
dc.subjectPrivacyen
dc.subjectAuthentication schemeen
dc.subjectIntegrityen
dc.title適用於電子醫療環境之安全驗證機制zh_TW
dc.titleSecurity Authentication Mechanisms for Electronic Medicine Environmentsen
dc.typeThesis
dc.date.schoolyear99-2
dc.description.degree博士
dc.contributor.oralexamcommittee陳俊良,薛智文,雷欽隆,鄭振牟,謝續平,孫宏民,陳澤雄
dc.subject.keyword醫療環境,隱私性,完整性,驗證機制,健康保險可攜性與責任法案,zh_TW
dc.subject.keywordMedical environments,Privacy,Integrity,Authentication scheme,Health Insurance Portability and Accountability Act,en
dc.relation.page90
dc.rights.note有償授權
dc.date.accepted2011-06-07
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊工程學研究所zh_TW
Appears in Collections:資訊工程學系

Files in This Item:
File SizeFormat 
ntu-100-1.pdf
  Restricted Access
1.19 MBAdobe PDF
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved