|
[1]Health Insurance Portability and Accountability Act of 1996,” 104th Congress, Public Law 104-191, 1996. [2]Centers for Medicare and Medicaid Services (1996), Health Insurance Portability Accountability Act of 1996 (HIPAA). [Online]. Available : http://cms.hhs.gov/hipaa/ [3]Department of Health and Human Services, “Standards for Privacy of Individually Identifiable Health Information,” Federal Register, vol. 67, pp. 53181–53273, Aug. 2002. [4]Stevens, G. “A Brief Summary of the Medical Privacy Rule,” CRS Report for Congress, April, 30th, 2003. [5]Department of Health and Human Services, “Security and electronic signature standards,” Federal Register, vol. 63, pp. 43241–43280, Aug. 1998. [6]J. Collmann, D. Lambert, M. Brummett, D. DeFord, J. Coleman, T.Cooper, K. Mcall, D. Seymour, C. Albert, A. Dorofee., “Beyond good practice: why HIPAA only addresses part of the data security problem,” International Congress Series, 1268, pp. 113-118, 2004. [7]J. L. Zoreda and J. M. Oton, Smart Cards. Norwood, MA: Artech House, 1994. [8]Rienhoff Otto, Integrated Circuit Health Data Cards (Smart Cards): A Primer for Health Professionals, Washington, D. C. PAHO, 2003. [9]Davie Jones, “Smart cards — the key to secure and flexible healthcare provision,” Card Technology Today, Vol.15, Issue.11, pp.8, Nov.-Dec., 2003. [10]C. Lambrinoudakis and S. Gritzalis, “Managing medical and insurance information through a smart-card-based information system,” J. Med. Syst., vol. 24, no. 4, pp. 213–234, 2000. [11]B. Lampson, M. Abadi, M. Burrows, E. Wobber, “Authentication in Distributed Systems: Theory and Practice,” ACM Trans. Computer Systems, Vol.10, No.4, pp. 265-310, Nov. 1992. [12]Schneier, Bruce, Applied Cryptography. 2nd ed. John Wiley & Sons, 1996. [13]National Institute of Standards and Technology, “Advanced Encryption Standard”, FIPS 197, 26 November 2001. [14]“Proposed Federal Information Processing Standard for Digital Signature Standard (DSS),” Federal Register, Vol.56, No.169, pp.42980-42982, Aug.30, 1991. [15]T. ELGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Tran. Inform. Theory, Vol.31, No.4, pp.469-472, 1985. [16]National Institute of Standards and Technology, “Secure Hash Standard”, FIPS 180-1, 17 April 1995. [17]Giesecke & Devient Gmbh (2004), “Smart Health Card: The key to the health care system of the future,” [Online]. Available: http://www.gi-de.com/ [18]B. Blobel and P.Pharow, “Experiences with health professional card,” in Proc. Electron. Health Rec. Europe’97, London, U. K., pp. 29-39. [19]William C.Pao, ”NHI IC cards in use at all hospitals, clinics,” The China Post, pp. 5, Friday, March, 2004. [Online]. Available: http://www.nhi.gov.tw/00english/file/0305paper.pdf [20]Bureau of National Health Insurance,” NHI Profile/ Current Status,” [Online]. Available: http://www.nhi.gov.tw/00english/e_05pro_104.htm [21]S.M. Yen and C.S.Laih, “Improved Digital Signature Algorithm,” IEEE Trans. on Computers, Vol.44, No.5, pp.729-730, May 1995.
|