6,096 research outputs found
A Community-Driven Validation Service for Standard Medical Imaging Objects
Digital medical imaging laboratories contain many distinct types of equipment
provided by different manufacturers. Interoperability is a critical issue and
the DICOM protocol is a de facto standard in those environments. However,
manufacturers' implementation of the standard may have non-conformities at
several levels, which will hinder systems' integration. Moreover, medical staff
may be responsible for data inconsistencies when entering data. Those
situations severely affect the quality of healthcare services since they can
disrupt system operations. The existence of software able to confirm data
quality and compliance with the DICOM standard is important for programmers, IT
staff and healthcare technicians. Although there are a few solutions that try
to accomplish this goal, they are unable to deal with certain situations that
require user input. Furthermore, these cases usually require the setup of a
working environment, which makes the sharing of validation information more
difficult. This article proposes and describes the development of a Web DICOM
validation service for the community. This solution requires no configuration
by the user, promotes validation results share-ability in the community and
preserves patient data privacy since files are de-identified on the client
side.Comment: Computer Standards & Interfaces, 201
Cryptanalysis of two mutual authentication protocols for low-cost RFID
Radio Frequency Identification (RFID) is appearing as a favorite technology
for automated identification, which can be widely applied to many applications
such as e-passport, supply chain management and ticketing. However, researchers
have found many security and privacy problems along RFID technology. In recent
years, many researchers are interested in RFID authentication protocols and
their security flaws. In this paper, we analyze two of the newest RFID
authentication protocols which proposed by Fu et al. and Li et al. from several
security viewpoints. We present different attacks such as desynchronization
attack and privacy analysis over these protocols.Comment: 17 pages, 2 figures, 1 table, International Journal of Distributed
and Parallel system
Recommended from our members
SAnoVs: Secure Anonymous Voting Scheme for clustered ad hoc networks
In this paper we propose a secure anonymous voting scheme (SAnoVS) for re-clustering in the ad-hoc network. SAnoVS extends our previous work of degree-based clustering algorithms by achieving anonymity and confidentiality of the voting procedure applied to select new cluster heads. The security of SAnoVS is based on the difficulty of computing discrete logarithms over elliptic curves, the intractability of inverting a one-way hash function and the fact that only neighboring nodes contribute to the generation of a shared secret. Furthermore, we achieve anonymity since our scheme does not require any identification information as we make use of a polynomial equation system combined with pseudo-random coordinates. The security analysis of our scheme is demonstrated with several attacks scenarios.examined with several attack scenarios and experimental results
- …