Appropriate Medical drugs in the correct dosage should be used to treat diseases. The incorrect administration of drugs has been caused not only by human error but also by the confusing names and/or appearances of some drugs. With this background, the authors have studied quantitative indicators to objectively evaluate the similarity of drug names and drug package appearances. In order to share cases of drug/medical equipment recall, information on these cases has been disclosed, and it was found that there was a problem with classification of danger at the time of use. In this article, we overview these cases and mainly discuss the information engineering approach and its problems regarding the safety of drug use.
Secret sharing is a method of protecting information securely. The information is divided into n shares, and the information is reconstructed from any k shares but no knowledge of it is revealed from k-1 shares. Physical layer security is a method of yielding a favorable receive condition at an authorized destination terminal in wireless communications. In this study, we explain the fundamentals of secret sharing and physical layer security, and approaches to enhancing the security of wireless communications based on secret sharing and signal processing in physical layer security.
This paper describes the technical specifications and standardization activities of FIDO (Fast IDentity Online), which promotes simpler, stronger authentication using public-key cryptography and enhances privacy preservation and cross-platform support to expand its ecosystem.
Information security and safety in the IoT era strongly depends on the protection of information through communication and IoT devices. Encryption techniques and hardware protection are becoming important means of preventing illegal data manipulation and abstraction through communication channels and at IoT devices. Cryptography has always been regarded as “unnecessary and undesirable” things. Hardware is regarded as having low flexibility, meaning that software is preferred, except for a few exceptions. In addition, hardware implementation is often regarded as the second option that follows ever changing cryptographic algorithm. This sometimes means thar some cryptographic algorithms that would drastically improve the convenience and security of IT devices are not utilized because of their insufficient performance. Here, we expect the widespcead use of such cryptographic algorithms and we introduce typical cryptographic algorithms from the aspect of performance perspectives in hardware implementation.
This article reviews CMOS-based biosensing technology. The recent improvement of CMOS circuit technology enables its range of applications to be expanded from only information and communication technology (ICT) to various applications, particularly in the biotechnology and medical fields. Conferences focusing on these topics such as BioCAS and IMBioC have been established. Following this trend, this article introduces fundamental and state-of-the-art CMOS biosensing technologies.