Abstract— Home healthcare based on ubiquitous technology
is emerging as a solution to increasing chronic disease patients
with the advent of aging of society. While u-healthcare has the
advantage that improves accessibility to medical services, it also
increases the probability of the infringement of privacy of
personal medical information, the leakage of which can do
greater damage than any other information. Recently, Huang et
al. proposed the identity authentication and context privacy
preservation in wireless health monitoring system, which is based
on identity-based cryptography and identity-based signature.
The purpose of this paper is to review Huang et al.’s security
scheme, analyze it focused on the security and privacy concerns,
and provide directions to improve the scheme.
Keywords—u-healthcare; identity authentication; context
privacy; body area network; security
abstract-home healthcare based on ubiquitous technology
is emerging as a solution to increasing chronic disease patients
with the advent of aging of society. while u-healthcare has the
advantage that improves accessibility to medical services, it also
increases the probability of the infringement of privacy of
personal medical information, the leakage of which can do
.greater damage than any other information. recently, huang et
al. proposed the identity authentication and context privacy
preservation in wireless health monitoring system, which is based
on identity-based cryptography and identity-based signature.
the purpose of this paper is to review huang et al. 's security
scheme, analyze. it focused on the security and privacy concerns,
.and provide directions to improve the scheme.
keywords-u-healthcare; identity authentication; context
privacy; body area network; security.
การแปล กรุณารอสักครู่..
![](//thimg.ilovetranslation.com/pic/loading_3.gif?v=b9814dd30c1d7c59_8619)
Abstract— Home healthcare based on ubiquitous technology
is emerging as a solution to increasing chronic disease patients
with the advent of aging of society. While u-healthcare has the
advantage that improves accessibility to medical services, it also
increases the probability of the infringement of privacy of
personal medical information, the leakage of which can do
greater damage than any other information. Recently, Huang et
al. proposed the identity authentication and context privacy
preservation in wireless health monitoring system, which is based
on identity-based cryptography and identity-based signature.
The purpose of this paper is to review Huang et al.'s security
scheme, analyze it focused on the security and privacy concerns,
and provide directions to improve the scheme.
Keywords—u-healthcare; identity authentication; context
privacy; body area network; security
การแปล กรุณารอสักครู่..
![](//thimg.ilovetranslation.com/pic/loading_3.gif?v=b9814dd30c1d7c59_8619)
- Abstract Home healthcare based on ubiquitous technology
is emerging as a solution to increasing chronic disease patients
with the advent of aging of society. While U-healthcare
has the advantage that improves accessibility to medical services, it also increases the probability of
the
infringement of personal privacy of medical information, the leakage of which can do
greater damage than any other information.Recently, Huang
et al. proposed the identity and authentication context privacy preservation in
Wireless health monitoring system, which is based on
identity-based cryptography and identity-based signature.
The purpose of this paper is to review Huang et al. '
s security scheme, analyze it focused on the Security and Privacy concerns,
and provide directions to improve the scheme.
Keywords - U-healthcare; identity authentication; context
privacy; body area network; security
การแปล กรุณารอสักครู่..
![](//thimg.ilovetranslation.com/pic/loading_3.gif?v=b9814dd30c1d7c59_8619)