Read by QxMD icon Read

Secure messaging

Ephanielle Verbanis, Anthony Martin, Raphaël Houlmann, Gianluca Boso, Félix Bussières, Hugo Zbinden
Bit commitment is a fundamental cryptographic primitive in which a party wishes to commit a secret bit to another party. Perfect security between mistrustful parties is unfortunately impossible to achieve through the asynchronous exchange of classical and quantum messages. Perfect security can nonetheless be achieved if each party splits into two agents exchanging classical information at times and locations satisfying strict relativistic constraints. A relativistic multiround protocol to achieve this was previously proposed and used to implement a 2-millisecond commitment time...
September 30, 2016: Physical Review Letters
B Santhi, B Dheeptha
The field of telemedicine has gained immense momentum, owing to the need for transmitting patients' information securely. This paper puts forth a unique method for embedding data in medical images. It is based on edge based embedding and XOR coding. The algorithm proposes a novel key generation technique by utilizing the design of a sudoku puzzle to enhance the security of the transmitted message. The edge blocks of the cover image alone, are utilized to embed the payloads. The least significant bit of the pixel values are changed by XOR coding depending on the data to be embedded and the key generated...
2016: SpringerPlus
Zubin J Daruwalla, Jing L Loh, Chaoyan Dong
BACKGROUND: The Personal Data Protection Act (PDPA) of Singapore was first passed in 2012, with subsequent enforcement regulations effective in 2014. Although medical education via digital platforms is not often used in medical schools in Singapore as of yet, many current means of communication at all levels in the medical community from medical schools to clinics to hospitals are unsecure and noncompliant with the PDPA. OBJECTIVE: This pilot study will assess the effectiveness of MyDoc, a secure, mobile telehealth application and messaging platform, as an educational tool, secure communications tool, and a tool to raise awareness of the PDPA...
August 9, 2016: JMIR Med Educ
Jolie N Haun, Margeaux Chavez, Kim M Nazi, Nicole Antinori
BACKGROUND: The US Department of Veterans Affairs (VA) has developed various health information technology (HIT) resources to provide accessible veteran-centered health care. Currently, the VA is undergoing a major reorganization of VA HIT to develop a fully integrated system to meet consumer needs. Although extensive system documentation exists for various VA HIT systems, a more centralized and integrated perspective with clear documentation is needed in order to support effective analysis, strategy, planning, and use...
October 6, 2016: Journal of Medical Internet Research
Anyembe Andrew Omala, Niyifasha Robert, Fagen Li
Wireless body area network (WBANs) is composed of sensors that collect and transmit a person's physiological data to health-care providers in real-time. In order to guarantee security of this data over open networks, a secure data transmission mechanism between WBAN and application provider's servers is of necessity. Modified medical data does not provide a true reflection of an individuals state of health and its subsequent use for diagnosis could lead to an irreversible medical condition. In this paper, we propose a lightweight certificateless signcryption scheme for secure transmission of data between WBAN and servers...
November 2016: Journal of Medical Systems
Hang Lu, Katherine A McComas, John C Besley
Genetic modification (GM) of crops and climate change are arguably two of today's most challenging science communication issues. Increasingly, these two issues are connected in messages proposing GM as a viable option for ensuring global food security threatened by climate change. This study examines the effects of messages promoting the benefits of GM in the context of climate change. Further, it examines whether explicit reference to "climate change," or "global warming" in a GM message results in different effects than each other, or an implicit climate reference...
September 24, 2016: Appetite
Si-Hui Tan, Joshua A Kettlewell, Yingkai Ouyang, Lin Chen, Joseph F Fitzsimons
Encryption schemes often derive their power from the properties of the underlying algebra on the symbols used. Inspired by group theoretic tools, we use the centralizer of a subgroup of operations to present a private-key quantum homomorphic encryption scheme that enables a broad class of quantum computation on encrypted data. The quantum data is encoded on bosons of distinct species in distinct spatial modes, and the quantum computations are manipulations of these bosons in a manner independent of their species...
2016: Scientific Reports
Callum Croal, Christian Peuntinger, Bettina Heim, Imran Khan, Christoph Marquardt, Gerd Leuchs, Petros Wallden, Erika Andersson, Natalia Korolkova
Digital signatures guarantee the authorship of electronic communications. Currently used "classical" signature schemes rely on unproven computational assumptions for security, while quantum signatures rely only on the laws of quantum mechanics to sign a classical message. Previous quantum signature schemes have used unambiguous quantum measurements. Such measurements, however, sometimes give no result, reducing the efficiency of the protocol. Here, we instead use heterodyne detection, which always gives a result, although there is always some uncertainty...
September 2, 2016: Physical Review Letters
Gregory E Simon, Arne Beck, Rebecca Rossom, Julie Richards, Beth Kirlin, Deborah King, Lisa Shulman, Evette J Ludman, Robert Penfold, Susan M Shortreed, Ursula Whiteside
BACKGROUND: Suicide remains the 10th-ranked most frequent cause of death in the United States, accounting for over 40,000 deaths per year. Nonfatal suicide attempts lead to over 200,000 hospitalizations and 600,000 emergency department visits annually. Recent evidence indicates that responses to the commonly used Patient Health Questionnaire (PHQ9) can identify outpatients who are at risk of suicide attempt and suicide death and that specific psychotherapy or Care Management programs can prevent suicide attempts in high-risk patients...
2016: Trials
Lawrence J Purpura, Moses Soka, April Baller, Stephen White, Emerson Rogers, Mary J Choi, Nuha Mahmoud, Christine Wasunna, Moses Massaquoi, Kristin Vanderende, Jomah Kollie, Straker Dweh, Philip Bemah, Athalia Christie, Victor Ladele, Onyekachi Subah, Satish Pillai, Margaret Mugisha, Jonathan Kpaka, Stuart Nichol, Ute Ströher, Neetu Abad, Shauna Mettee-Zarecki, Jeff A Bailey, Pierre Rollin, Barbara Marston, Tolbert Nyenswah, Alex Gasasira, Barbara Knust, Desmond Williams
According to World Health Organization (WHO) data, the Ebola virus disease (Ebola) outbreak that began in West Africa in 2014 has resulted in 28,603 cases and 11,301 deaths (1). In March 2015, epidemiologic investigation and genetic sequencing in Liberia implicated sexual transmission from a male Ebola survivor, with Ebola virus detected by reverse transcription-polymerase chain reaction (RT-PCR) 199 days after symptom onset (2,3), far exceeding the 101 days reported from an earlier Ebola outbreak (4). In response, WHO released interim guidelines recommending that all male survivors, in addition to receiving condoms and sexual risk reduction counseling at discharge from an Ebola treatment unit (ETU), be offered semen testing for Ebola virus RNA by RT-PCR 3 months after disease onset, and every month thereafter until two consecutive semen specimens collected at least 1 week apart test negative for Ebola virus RNA (5)...
2016: MMWR. Morbidity and Mortality Weekly Report
Ingrid Weiss, Serena Stepanovic, Ulembe Chinyemba, Jessica Bateman, Carolyn Hemminger, Emily Burrows
The U.S. Agency for International Development Feed the Future Mawa Project - led by Catholic Relief Services - aims to improve food and economic security for farming households in Zambia's Eastern Province. Mawa employs social and behavior change (SBC) strategies with households and communities to improve nutrition and reduce stunting among children under two (CU2). To support these strategies, sub-partner University Research Co., LLC employed a participatory process to develop a series of 35 action cards, each illustrating one project-promoted behavior, that are used at household and community group levels...
2016: Frontiers in Public Health
Ron Bowles, Gregory S Anderson, Colleen Vaughan
The Building Resilient Communities Workshop was hosted and organized by the Justice Institute of British Columbia, with the support of Emergency Management British Columbia and the Canadian Safety and Security Program, Defence Research and Development Canada, Centre for Security Science. Thirty-four participants from multiple levels of government, senior practitioners, policy makers, academia, community members, and a variety of agencies disseminated knowledge and developed concrete strategies and priority actions areas for supporting ongoing and emerging initiatives in community and disaster resilience planning...
July 2016: Journal of Emergency Management: JEM
Casey Inez Canfield, Baruch Fischhoff, Alex Davis
OBJECTIVE: We use signal detection theory to measure vulnerability to phishing attacks, including variation in performance across task conditions. BACKGROUND: Phishing attacks are difficult to prevent with technology alone, as long as technology is operated by people. Those responsible for managing security risks must understand user decision making in order to create and evaluate potential solutions. METHOD: Using a scenario-based online task, we performed two experiments comparing performance on two tasks: detection, deciding whether an e-mail is phishing, and behavior, deciding what to do with an e-mail...
August 25, 2016: Human Factors
Anuj K Dalal, Jeffrey Schnipper, Anthony Massaro, John Hanna, Eli Mlaver, Kelly McNally, Diana Stade, Constance Morrison, David W Bates
Communication in acute care settings is fragmented and occurs asynchronously via a variety of electronic modalities. Providers are often not on the same page with regard to the plan of care. We designed and developed a secure, patient-centered "microblog" messaging platform that identifies care team members by synchronizing with the electronic health record, and directs providers to a single forum where they can communicate about the plan of care. The system was used for 35% of patients admitted to a medical intensive care unit over a 6-month period...
August 18, 2016: Journal of the American Medical Informatics Association: JAMIA
Neha Patel, James E Siegler, Nathaniel Stromberg, Neil Ravitz, C William Hanson
BACKGROUND: In hospitals, effective and efficient communication among care providers is critical to the provision of high-quality patient care. Yet, major problems impede communications including the frequent use of interruptive and one-way communication paradigms. This is especially frustrating for frontline providers given the dynamic nature of hospital care teams in an environment that is in constant flux. METHODS: We conducted a pre-post evaluation of a commercially available secured messaging mobile application on 4 hospital units at a single institution for over one year...
2016: Applied Clinical Informatics
Jennifer B McClure, Melissa L Anderson, Katharine Bradley, Lawrence C An, Sheryl L Catz
BACKGROUND: Mobile health (mHealth) interventions hold great promise for helping smokers quit since these programs can have wide reach and facilitate access to comprehensive, interactive, and adaptive treatment content. However, the feasibility, acceptability, and effectiveness of these programs remain largely untested. OBJECTIVE: To assess feasibility and acceptability of the My Mobile Advice Program (MyMAP) smoking cessation program and estimate its effects on smoking cessation and medication adherence to inform future research planning...
2016: JMIR MHealth and UHealth
Goncalo Martins, Arul Moondra, Abhishek Dubey, Anirban Bhattacharjee, Xenofon D Koutsoukos
In modern networked control applications, confidentiality and integrity are important features to address in order to prevent against attacks. Moreover, network control systems are a fundamental part of the communication components of current cyber-physical systems (e.g., automotive communications). Many networked control systems employ Time-Triggered (TT) architectures that provide mechanisms enabling the exchange of precise and synchronous messages. TT systems have computation and communication constraints, and with the aim to enable secure communications in the network, it is important to evaluate the computational and communication overhead of implementing secure communication mechanisms...
2016: Sensors
Stephanie L Shimada, Jeroan J Allison, Amy K Rosen, Hua Feng, Thomas K Houston
BACKGROUND: Personal health records (PHRs) have the potential to improve patient self-management for chronic conditions such as diabetes. However, evidence is mixed as to whether there is an association between PHR use and improved health outcomes. OBJECTIVE: The aim of this study was to evaluate the association between sustained use of specific patient portal features (Web-based prescription refill and secure messaging-SM) and physiological measures important for the management of type 2 diabetes...
2016: Journal of Medical Internet Research
Barbara McPake, Kara Hanson
The private sector has a large and growing role in health systems in low-income and middle-income countries. The goal of universal health coverage provides a renewed focus on taking a system perspective in designing policies to manage the private sector. This perspective requires choosing policies that will contribute to the performance of the system as a whole, rather than of any sector individually. Here we draw and extrapolate main messages from the papers in this Series and additional sources to inform policy and research agendas in the context of global and country level efforts to secure universal health coverage in low-income and middle-income countries...
August 6, 2016: Lancet
Sarah A Collins, Ronen Rozenblum, Wai Yin Leung, Constance Rc Morrison, Diana L Stade, Kelly McNally, Patricia Q Bourie, Anthony Massaro, Seth Bokser, Cindy Dwyer, Ryan S Greysen, Priyanka Agarwal, Kevin Thornton, Anuj K Dalal
OBJECTIVE: To describe current practices and stakeholder perspectives of patient portals in the acute care setting. We aimed to: (1) identify key features, (2) recognize challenges, (3) understand current practices for design, configuration, and use, and (4) propose new directions for investigation and innovation. MATERIALS AND METHODS: Mixed methods including surveys, interviews, focus groups, and site visits with stakeholders at leading academic medical centers...
June 29, 2016: Journal of the American Medical Informatics Association: JAMIA
Fetch more papers »
Fetching more papers... Fetching...
Read by QxMD. Sign in or create an account to discover new knowledge that matter to you.
Remove bar
Read by QxMD icon Read

Search Tips

Use Boolean operators: AND/OR

diabetic AND foot
diabetes OR diabetic

Exclude a word using the 'minus' sign

Virchow -triad

Use Parentheses

water AND (cup OR glass)

Add an asterisk (*) at end of a word to include word stems

Neuro* will search for Neurology, Neuroscientist, Neurological, and so on

Use quotes to search for an exact phrase

"primary prevention of cancer"
(heart or cardiac or cardio*) AND arrest -"American Heart Association"