2020
DOI: 10.1080/09540091.2020.1854180
|View full text |Cite
|
Sign up to set email alerts
|

A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 30 publications
0
12
0
Order By: Relevance
“…The energy consumption by using the AES algorithm is 1.21 microjoule/byte. Figure 7 clearly shows the scheme outperformance from others based on the same platform, which is effective in securing the patient`s confidential data [ 25 ].…”
Section: State-of-the-art Reviewmentioning
confidence: 99%
“…The energy consumption by using the AES algorithm is 1.21 microjoule/byte. Figure 7 clearly shows the scheme outperformance from others based on the same platform, which is effective in securing the patient`s confidential data [ 25 ].…”
Section: State-of-the-art Reviewmentioning
confidence: 99%
“…There are also other concerns like excessive data collection, data usage policies and lack of user control [185] . The existing schemes employed in COVID-19 mobile health apps are not conforming the HIPAA (Health Insurance Portability and Accountability Act) and they are not providing enough end-to-end security [186] which make these mobile health apps vulnerable to many cyber risks.…”
Section: Challenges and Solutionsmentioning
confidence: 99%
“…Extensive simulation studies show that PDFS can boost the privacy security for data fusion in COVID-19 application environments based on IoMT while achieving high task classification precision, task completion rate, task data reliability, and task participation rate as well as a low average error rate. Using the trusted platform module, the authors suggested a group cloud architecture in an IoMT environment that guarantees end-to-end security and avoids many of the current negative aspects [37]. Authors in [38] proposed a configurable, reliable, and confidential distributed data storage scheme, which aims to encrypt the data and controlling the computing processes.…”
Section: Related Workmentioning
confidence: 99%