2022
DOI: 10.1109/jsyst.2021.3118014
|View full text |Cite
|
Sign up to set email alerts
|

An Identity-Based Authentication Protocol for the Telecare Medical Information System (TMIS) Using a Physically Unclonable Function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Cost savings are achievable through reduced data transfers and optimized resource usage. Scalability is facilitated by the ability to horizontally scale resources by adding more edge devices [41].…”
Section: Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Cost savings are achievable through reduced data transfers and optimized resource usage. Scalability is facilitated by the ability to horizontally scale resources by adding more edge devices [41].…”
Section: Proposed Methodsmentioning
confidence: 99%
“…It can uniquely identify a billions of ICs even though they are manufactured by the same vendor using same design specification. Another noteworthy feature is it can be used as private-public key generation [41]. Asymmetric key generation process using PUF has been explained in Marchand et al [22] and Park et al's [42] studies.…”
Section: Related Workmentioning
confidence: 99%
“…Brand image can increase brand trust levels and trigger brand impact, which in turn increases the level of brand loyalty [24] . Similarly, a number of researchers have performed simulations [25][26][27][28][29][30][31][32][33][34][35] . In order to maximize the significant economic benefits offered by brand equity as an interactive, market-based resource, businesses need to create brand trust [36] .…”
Section: Brand Trustmentioning
confidence: 99%
“…Although the protocol developed in [103] is efficient and secure, it cannot provide anonymity and is susceptible to impersonation and password guessing attacks [104], [105]. This anonymity challenge is addressed by the PUF based scheme developed in [106]. Based on RFID, a privacy preservation protocol is presented in [107] securing remote medical data.…”
Section: Related Workmentioning
confidence: 99%