Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2023
DOI: 10.3390/s23125419
|View full text |Cite
|
Sign up to set email alerts
|

A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System

Abstract: The integration of the Internet of Things (IoT) and the telecare medical information system (TMIS) enables patients to receive timely and convenient healthcare services regardless of their location or time zone. Since the Internet serves as the key hub for connection and data sharing, its open nature presents security and privacy concerns and should be considered when integrating this technology into the current global healthcare system. Cybercriminals target the TMIS because it holds a lot of sensitive patien… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Despite the numerous advantages of medical data sharing, significant concerns remain, particularly in the realms of security and privacy. The sensitive nature of medical information means that without adequate protection, there is a substantial risk of severe privacy violations and data breaches [3][4][5]. Unauthorized access or the theft of medical data can not only infringe upon privacy rights but also undermine trust in the entire medical information system.…”
Section: Introductionmentioning
confidence: 99%
“…Despite the numerous advantages of medical data sharing, significant concerns remain, particularly in the realms of security and privacy. The sensitive nature of medical information means that without adequate protection, there is a substantial risk of severe privacy violations and data breaches [3][4][5]. Unauthorized access or the theft of medical data can not only infringe upon privacy rights but also undermine trust in the entire medical information system.…”
Section: Introductionmentioning
confidence: 99%
“…New technologies developed and developed in recent years allow people to reduce their time spent on traditional activities such as transportation, communications, training, work, etc. [1][2][3][4][5][6][7][8], while nutrition is also one of the activities for which a modern person still spends a lot of time. In this regard, the comparison and selection of the optimal application that allows you to minimize the time spent by a person on food delivery is becoming increasingly important in the modern world.…”
Section: Introductionmentioning
confidence: 99%