References
- K Abouelmehdi, AB Hessane, H Khaloufi Big healthcare data: preserving security and privacy. Journal of big data 5:1.(2018)https://doi.org/10.1186/s40537-017-0110-7.
- I Anshel, M Anshel, B Fisher, D Goldfeld New key agreement protocols in braid group cryptography. Conference topics in cryptology-CT-RSA 2001, the cryptographers track at RSA conference 2001, (LNCS 2020:13-27) San Francisco, CA, USA. (2001)https://doi.org/10.1007/3-540-45353-9_2
- I Anshel, M Anshel, D Goldfeld Method and apparatus for cryptographically secure algebraic key establishment protocols based on monoids. United States patent (US6493449B2).(2002)https://patents.google.com/patent/US6493449 Accessed 22 June 2018.
- I Anshel, D Atkins, D Goldfeld, PE Gunnells A class of hash functions based on the algebraic eraser. Groups, complexity, cryptology, 1-7. (2016)https://doi.org/10.1515/gcc-2016-0004
- E Artin Theory of braids. Annals of mathematics, second series 48(1):101-126. (1947) DOI: 10.2307/1969218
- D Atkins, D Goldfeld Addressing the algebraic eraser Diffie-Hellman over-the-air protocol. (2016)https://eprint.iacr.org/2016/205.pdf Accessed 10 January 2017.
- L C Baumann, MA Karel Electronic health record. Encyclopedia of behavioral medicine, Springer, 669-670.(2013).
- J S Birman, TE Brendle Braids: a survey, In Handbook of knot theory. Elsevier, B.V., Amsterdam, 19-103. (2005).
- A Boonstra, A Versluis, JFJ Vos Implementing electronic health records in hospitals: A systematic literature review. BMC health services research, Springer 14:370.(2014)https://doi.org/10.1186/1472-6963-14-370
- Z Cao, X Dong, L Wang, New public key cryptosystem using polynomials over non-commutative rings. Cryptology eprint archive. (2007), https://eprint.iacr.org/2007/009.pdf Accessed 10 June 2018.
- P Dehornoy Braid-based cryptography. Group theory, statistics and cryptography, contemporary mathematics, American mathematical society, province 360:5-33. (2004).
- P Deshmukh, Design of cloud security in the EHR for Indian healthcare services. Journal of King Saud university-computer and information sciences (Elsevier) 29(3):281-287.(2017) https://doi.org/10.1016/j.jk-suci.2016.01.002 doi: 10.1016/j.jksuci.2016.01.002
- Electronic health record standards for India helpdesk, Centre for health information (CHI). National institute of health and family welfare (NIHFW), ministry of health and family welfare (MoHFW), government of India.(2015)https://www.nhp.gov.in/ehr-standards-helpdesk_ms Accessed 2 February 2017.
- Electronic health record standards for India ,Approved by ministry of health & family welfare. Government of India.(2013)https://www.nhp.gov.in/NHPfiles/ehr_2013.pdf Accessed 3 January 2017.
- Electronic health record (EHR) standards for India, Standards set recommendation v 2.0. Ministry of health & family welfare, government of India.(2016)https://www.nhp.gov.in/NHPfiles/EHR-Standards-2016-MoHFW.pdf Accessed 3 September 2017
- Q Gan, Q Cao Adoption of electronic health record system: Multiple theoretical perspectives. 47th Hawaii international conference on system sciences (HICSS), IEEE, USA. (2014), DOI: 10.1109/HIC-SS.2014.352
- D Garber Braid group cryptography, chapter 1, World scientific review volume, BGC lecture notes final, 1-75. (2009)https://pdf.semanticscholar.org/3acs/fe773d0ccd42f7aef41e1daedb26f4d01e48.pdf Accessed 13 June 2018.
- Health insurance portability and accountability act of 1996 Government publishing office, USA. (1996)https://www.gpo.gov/fdsys/pkg/PLAW-104publ191/pdf/PLAW-104publ191.pdf Accessed 12 March 2017.
- Hu, Jian-Jun, et al. “Sensor fault diagnosis and processing for a twospeed AMT for pure electric vehicles.” Journal of Discrete Mathematical Sciences and Cryptography 19.3 (2016): 505-521. doi: 10.1080/09720529.2016.1177967
- Isik, Computational problems in the braid group with applications to cryptography.(2005) https://www.math.uci.edu/~isik/files/braids.pdf Accessed 12 June 2016.
- Khan, Tayyab, Karan Singh, Mohamed Abdel-Basset, Hoang Viet Long, Satya P. Singh, and Manisha Manjul. “A Novel and Comprehensive Trust Estimation Clustering-Based Approach for Large Scale Wireless Sensor Networks.” IEEE Access, vol. 7, pp. 58221-58240, (2019).
- Mukhopadhyay, S. “A decision support system for medical diagnosis.” Journal of Discrete Mathematical Sciences and Cryptography 3.1-3 (2000): 179-192. doi: 10.1080/09720529.2000.10697906
- S V B Jardim The electronic health record and its contribution to health care information systems interoperability. Procedia technology-Elsevier 9:940-948.(2013) https://doi.org/10.1016/j.protcy.2013.12.105
- KH Ko, SJ Lee, JH Cheon, JW Han, JS Kang, C Park New public-key cryptosystems using braid groups. Advances in cryptology-Crypto 2000, Springer, LNCS 1880: 166-183.(2000), https://doi.org/10.1007/3-540-44598-6_10
- N Koblitz, AJ Menezes A survey of public key cryptosystems. SIAM review 46, 599-634. (2004)https://doi.org/10.1137/S0036144503439190
- C S Kruse, B Smith, H Vanderlinden, A Nealand,Security techniques for the electronic health records. Journal of medical systems 41:127. (2017), https://doi.org/10.1007/s10916-017-0778-4
- Live mint, Future of public Wi-Fi hot spots in India (2016). www.livemint.com/Consumer/Uc506lrKsLh4TYllnqPcdO/Future-of-public-WiFi-hot-spots-in-India.html Accessed 7 April 2017.
- A Menezes, PCV Oorschot, SA Vanstone Handbook of applied cryptography, fifth edition. CRC press Inc., USA(2001).
- NBC news, Thousands of patient records leaked in New York hospital data breach. (2017).http://www.nbcnews.com/news/us-news/thousand-patient-records-leaked-hospital-data-breach-n756981
- V Shukla, A Chaturvedi, N Srivastava A new secure authenticated key agreement scheme for wireless (mobile) communication in an EHR system using cryptography. Communications on applied electronics (CAE), foundation of computer science (FCS), USA 3(3):16-21.(2015). DOI:10.5120/cae2015651903.
- Shanmugam M, Thiruvengadam S, Khurat A, Maglogiannis I Enabling secure mobile access for electronic health care applications. In proceedings of IEEE pervasive health conference and workshops, Innsbruk, Austria, 1-8. (2006) DOI: 10.1109/PCTHEALTH.2006.361689
- V Shpilrain, G Zapata Using decision problems in public key cryptog- raphy. Group, complexity, cryptology, 33-49. (2009), DOI: 10.1515/GCC.2009.33
- A.E.K Sobel The move toward electronic health records. Computer (IEEE) 45(11). (2012), DOI: 10.1109/MC.2012.387
- Summary of the HIPAA privacy rule (1996). https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html. Accessed 11 August 2017.
- P Szolovits, J Doyle, WJ Long, I Kohane, SG Pauker , Guardian angel: Patient-centered health information systems, reproduction of technical report MIT/LCS/TR-604, Massachusetts institute of technology laboratory for computer science. (1994), http://publications.csail.mit.edu/lcs/pubs/pdf/MIT-LCS-TR-604.pdf.
- The economic times, WiFi offered free in public places poses a major security risk (2015). https://economictimes.indiatimes.com/tech/internet/wifi-offered-free-in-public-places-poses-a-major-security-risk/articleshow/47350035.cmsAccessed 3 October 2017.
- The Indian express, Maharashtra website hacked: Dignostic lab details of 35,000 patients leaked (2016). http://indianexpress.com/article/india/diagnostic-lab-details-of-35000-patients-leaked-hiv-reports-4407762/Accessed 4 February 2018.
- The wire, without data security and privacy laws, medical records in India are highly vulnerable (2017). https://thewire.in/102349/without-data-security-and-privacy-laws-medical-records-in-india-are-highly-vulnerable/Accessed 2 May 2017.
- Turing machines: An introduction, CIT 596-Theory of computation (2005). http://www.seas.upenn.edu/~cit596/notes/turing.pdf Accessed 12 November 2016.
- H C Wen, YS Ho, WS Jian, HC Li, YHE Hsu, The Scientific production of electronic health record research, 1991-2005. Computer methods and programs in biomedicine, Elsevier 86:191-196., (2007), https://doi.org/10.1016/j.cmpb.2007.02.002
- S B Wilson, A Menezes, Authenticated Diffie-Hellman key agreement protocols. Proceedings of the 5th annual workshop on selected areas in cryptography (SAC’98), (LNCS), 339-361. (1998), https://link.springer.com/content/pdf/10.1007/3-540-48892-8_26.pdf Accessed 22 June 2018.
- Xiaoyou chen, Huiqun Wang. “Notes on conjugacy classes of finite groups.” Journal of Discrete Mathematical Sciences and Cryptography 7-8 (2018): 1519-1522. doi: 10.1080/09720529.2018.1459438
- Shakiba, A. “Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks.” Journal of Information and Optimization Sciences 40, no. 3 (2019): 725-750. doi: 10.1080/02522667.2018.1470752
- Robinson, Angela, and Rainer Steinwandt. “Group key establishment with physical unclonable functions.” Journal of Information and Optimization Sciences 40, no. 1 (2019): 69-80. doi: 10.1080/02522667.2017.1417728
- Wang, Ying, Jian He, Hao Zhao, Yao-Hui Han, and Xiao-Jiang Huang. “Intelligent community medical service based on internet of things.” Journal of Interdisciplinary Mathematics 21, no. 5 (2018): 1121–1126. doi: 10.1080/09720502.2018.1493040
- Sundarayya, P., and G. Vara Prasad. “A public key cryptosystem using Affine Hill Cipher under modulation of prime number.” Journal of Information and Optimization Sciences 40, no. 4 (2019): 919-930. doi: 10.1080/02522667.2018.1470751