Security and Communication Networks / 2020 / Article / Tab 3

Research Article

Enhancing Transaction Security for Handling Accountability in Electronic Health Records

Table 3

Notations of BAN logic [27].

SymbolDefinition

P, Q, RPrincipals (parties)
X, YStatements
KEncryption keys
P believes XP believes X or is entitled to believe X
P sees XP can read and repeat the message containing X
P said XP has said X (P believes X)
P controls XP has jurisdiction over X
Fresh (X)Formula X is fresh
Public key
Private key
Formula X is encrypted by the public key
Formula X is encrypted by the private key
(X)KThe hash value of X using K as a key

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.