2018
DOI: 10.1016/j.cmpb.2018.02.002
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
97
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 89 publications
(101 citation statements)
references
References 23 publications
0
97
0
Order By: Relevance
“…Functionality Scheme Rezaeibagha et al (2018) (25) Li et al (2018) (26) Our need long-term monitoring of physiological conditions can wear physiological sensing devices, and these sensing data can be provided to rural medical vehicles, so that doctors can diagnose symptoms. For patients with complicated or severe conditions, it is necessary to go to large hospitals in urban areas for further diagnosis and treatment.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Functionality Scheme Rezaeibagha et al (2018) (25) Li et al (2018) (26) Our need long-term monitoring of physiological conditions can wear physiological sensing devices, and these sensing data can be provided to rural medical vehicles, so that doctors can diagnose symptoms. For patients with complicated or severe conditions, it is necessary to go to large hospitals in urban areas for further diagnosis and treatment.…”
Section: Discussionmentioning
confidence: 99%
“…However, their scheme is not complete; it lacks architecture to include body sensor devices and does not achieve nonrepudiation. Li et al (26) proposed another cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems, which provided a generalized architecture. However, their scheme is also not complete, as it does not include a remote diagnosis authentication mechanism.…”
Section: Introductionmentioning
confidence: 99%
“…Mutual authentication means the parties that authenticates each other during communication [10]. The authenticate phases was divided into two parts.…”
Section: B Mutual Authenticationmentioning
confidence: 99%
“…Therefore, a secure authentication protocol is a proper solution to provide security and privacy for TMIS [9][10][11]. Hitherto, authentication protocol for integration telemedical systems in cloud computing environment recently has drawn significant attention from academia [12][13][14][15][16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, Mohit et al [17] and Cheng et al [20] both presented an improved mechanism for cloud-assisted medical care systems. Recently, Li et al [19] pointed out that Mohit et al 's proposal also was susceptible to health report revelation and inspection report forgery attacks. In Cheng et al 's scheme [20], the inputs of bilinear maps are generators in the corresponding cyclic groups, rather than random numbers of integer field .…”
Section: Introductionmentioning
confidence: 99%