Return to Article Details E-Health Privacy and Security through ECC, SHA-256, and Multi-Authority Approaches Download Download PDF