{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:47:33Z","timestamp":1747190853319,"version":"3.40.5"},"reference-count":26,"publisher":"Wiley","license":[{"start":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T00:00:00Z","timestamp":1641340800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Scientific Programming"],"published-print":{"date-parts":[[2022,1,5]]},"abstract":"<jats:p>The traditional centralized storage of traditional electronic medical records (EMRs) faces problems like data leakage, data loss, and EMR misplacement. The current protection measures for patients\u2019 privacy in EMRs cannot withstand the fast-developing password cracking technologies and frequency cyberattacks. This paper intends to innovate the information sharing and privacy protection of electronic nursing records (ENRs) management system. Specifically, the signature interception technology was introduced to EMRs, the different phases of certificateless signature interception scheme were depicted, and the validation procedures of the scheme were designed. Then, the six phases of ENR information sharing protocol based on alliance blockchain were described in detail. Finally, an end-to-end memory neural network was constructed for ENR classification. The proposed management scheme was proved effective through experiments.<\/jats:p>","DOI":"10.1155\/2022\/4169340","type":"journal-article","created":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T22:05:15Z","timestamp":1641420315000},"page":"1-12","source":"Crossref","is-referenced-by-count":2,"title":["Information Sharing and Privacy Protection of Electronic Nursing Record Management System"],"prefix":"10.1155","volume":"2022","author":[{"given":"Qiong","family":"Li","sequence":"first","affiliation":[{"name":"Nursing Department, Jiangxi Health Vocational College, Nanchang 330052, China"}]},{"given":"Hui","family":"Yu","sequence":"additional","affiliation":[{"name":"Quality Management Office, Jiangxi Health Vocational College, Nanchang 330052, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3741-1607","authenticated-orcid":true,"given":"Wei","family":"Li","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Jiangxi Normal University, Nanchang 330022, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/jcph.1717"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.18280\/isi.250201"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.18280\/ria.330305"},{"author":"S. Hashemi","key":"4","article-title":"A framework for managing cognitive load in electronic medical record systems training"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.18280\/ria.350104"},{"key":"6","first-page":"257","article-title":"Text data mining of the nursing care life log from electronic medical record","volume":"2239","author":"M. Kushima","year":"2019","journal-title":"Lecture Notes in Engineering and Computer Science"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719889330"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ictas.2019.8703606"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.4018\/jgim.20210701.oa4"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s12204-021-2285-5"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-10705-6"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51859-2_11"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2021.104537"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.3233\/SHTI200685"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/cpt.1980"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.4018\/irmj.2020070103"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2018.2844814"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.18280\/ts.380315"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/tensymp50017.2020.9230913"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2019.104066"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.3233\/SHTI200460"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.3233\/SHTI200453"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08983-7"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/3429551.3429592"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.18280\/jesa.530216"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.18280\/isi.250210"}],"container-title":["Scientific Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2022\/4169340.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2022\/4169340.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2022\/4169340.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,5]],"date-time":"2022-01-05T22:05:20Z","timestamp":1641420320000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/sp\/2022\/4169340\/"}},"subtitle":[],"editor":[{"given":"Ahmed","family":"Farouk","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2022,1,5]]},"references-count":26,"alternative-id":["4169340","4169340"],"URL":"https:\/\/doi.org\/10.1155\/2022\/4169340","relation":{},"ISSN":["1875-919X","1058-9244"],"issn-type":[{"type":"electronic","value":"1875-919X"},{"type":"print","value":"1058-9244"}],"subject":[],"published":{"date-parts":[[2022,1,5]]}}}