Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Mais filtros











Intervalo de ano de publicação
2.
J Med Syst ; 41(4): 59, 2017 Apr.
Artigo em Inglês | MEDLINE | ID: mdl-28247306

RESUMO

Recently, telemedicine offers medical services remotely via telecommunications systems and physiological monitoring devices. This scheme provides healthcare delivery services between physicians and patients conveniently, since some patients can not attend the hospital due to any reason. However, transmission of information over an insecure channel such as internet or private data storing generates a security problem. Therefore, authentication, confidentiality, and privacy are important challenges in telemedicine, where only authorized users should have access to medical or clinical records. On the other hand, chaotic systems have been implemented efficiently in cryptographic systems to provide confidential and privacy. In this work, we propose a novel symmetric encryption algorithm based on logistic map with double chaotic layer encryption (DCLE) in diffusion process and just one round of confusion-diffusion for the confidentiality and privacy of clinical information such as electrocardiograms (ECG), electroencephalograms (EEG), and blood pressure (BP) for applications in telemedicine. The clinical signals are acquired from PhysioBank data base for encryption proposes and analysis. In contrast with recent schemes in literature, we present a secure cryptographic algorithm based on chaos validated with the most complete security analysis until this time. In addition, the cryptograms are validated with the most complete pseudorandomness tests based on National Institute of Standards and Technology (NIST) 800-22 suite. All results are at MATLAB simulations and all them show the effectiveness, security, robustness, and the potential use of the proposed scheme in telemedicine.


Assuntos
Algoritmos , Segurança Computacional/instrumentação , Confidencialidade , Telemedicina/instrumentação , Pressão Sanguínea , Eletrocardiografia , Eletroencefalografia , Humanos
3.
Opt Express ; 20(17): 18911-24, 2012 Aug 13.
Artigo em Inglês | MEDLINE | ID: mdl-23038530

RESUMO

By employing real-time monitoring of single-photon avalanche photodiodes we demonstrate how two types of practical eavesdropping strategies, the after-gate and time-shift attacks, may be detected. Both attacks are identified with the detectors operating without any special modifications, making this proposal well suited for real-world applications. The monitoring system is based on accumulating statistics of the times between consecutive detection events, and extracting the afterpulse and overall efficiency of the detectors in real-time using mathematical models fit to the measured data. We are able to directly observe changes in the afterpulse probabilities generated from the after-gate and faint after-gate attacks, as well as different timing signatures in the time-shift attack. We also discuss the applicability of our scheme to other general blinding attacks.


Assuntos
Segurança Computacional/instrumentação , Fotometria/instrumentação , Fotometria/métodos , Processamento de Sinais Assistido por Computador/instrumentação , Sistemas Computacionais , Desenho de Equipamento , Análise de Falha de Equipamento
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA