2016
DOI: 10.1007/s11042-016-4208-2
|View full text |Cite
|
Sign up to set email alerts
|

An efficient improvement remote user mutual authentication and session key agreement scheme for E-health care systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
37
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 45 publications
(37 citation statements)
references
References 51 publications
0
37
0
Order By: Relevance
“…The principal contributions of this paper are the following. Analyzing the security of Ravanbakhsh and Nazari's scheme and showing its vulnerability to the known session‐specific temporary information attack and perfect forward insecurity. Designing an anonymous and unlinkable user authentication and key agreement scheme, which not only is free from the security limitations of previous protocols but also has a proper level of efficiency. Confirming the security of the proposed scheme with the widely accepted and well‐known automated validation of internet security protocols and applications (AVISPA) tool and further discussing it in an informal cryptanalysis manner. Comparing the proposed scheme with several related schemes in terms of functionalities and performance. Achieving low computational and communication costs without sacrificing the desired security properties. …”
Section: Introductionmentioning
confidence: 90%
See 4 more Smart Citations
“…The principal contributions of this paper are the following. Analyzing the security of Ravanbakhsh and Nazari's scheme and showing its vulnerability to the known session‐specific temporary information attack and perfect forward insecurity. Designing an anonymous and unlinkable user authentication and key agreement scheme, which not only is free from the security limitations of previous protocols but also has a proper level of efficiency. Confirming the security of the proposed scheme with the widely accepted and well‐known automated validation of internet security protocols and applications (AVISPA) tool and further discussing it in an informal cryptanalysis manner. Comparing the proposed scheme with several related schemes in terms of functionalities and performance. Achieving low computational and communication costs without sacrificing the desired security properties. …”
Section: Introductionmentioning
confidence: 90%
“…Quite recently, Ravanbakhsh and Nazari have proposed an interesting remote user authentication and key agreement protocol for the TMISs. Although their scheme has several merits, after careful observation, we found that it cannot totally provide the security features.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations