2021
DOI: 10.1016/j.jisa.2021.102992
|View full text |Cite
|
Sign up to set email alerts
|

An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 56 publications
(160 reference statements)
0
4
0
Order By: Relevance
“…To show that our scheme possesses superior properties, comparisons between authentication schemes ensuring anonymity [5,6,[11][12][13][14][15][16][17][18][19] and the proposed user authentication scheme are made as follows. Authentication schemes [5,[15][16][17] proposed for healthcare use biometrics as a factor to authenticate users, and this approach produces extra components to extract the biometrics needed. Authentication schemes were proposed for IoT applications [6,11,12], VANET [13,18,19], and cloud computing applications [13,14].…”
Section: Comparisons Between Authentication Schemes Ensuring Anonymit...mentioning
confidence: 99%
See 3 more Smart Citations
“…To show that our scheme possesses superior properties, comparisons between authentication schemes ensuring anonymity [5,6,[11][12][13][14][15][16][17][18][19] and the proposed user authentication scheme are made as follows. Authentication schemes [5,[15][16][17] proposed for healthcare use biometrics as a factor to authenticate users, and this approach produces extra components to extract the biometrics needed. Authentication schemes were proposed for IoT applications [6,11,12], VANET [13,18,19], and cloud computing applications [13,14].…”
Section: Comparisons Between Authentication Schemes Ensuring Anonymit...mentioning
confidence: 99%
“…Authentication schemes were proposed for IoT applications [6,11,12], VANET [13,18,19], and cloud computing applications [13,14]. Users in these authentication schemes [5,6,[11][12][13][14][15][16][17][18][19] need to register with a trusted authentication server, and be authenticated online when accessing services, where users may be authenticated by the trusted authentication server directly or by other servers with the trusted authentication server's help. In the proposed scheme, a user/executive can be authenticated offline, and no extra component is needed.…”
Section: Comparisons Between Authentication Schemes Ensuring Anonymit...mentioning
confidence: 99%
See 2 more Smart Citations