2021
DOI: 10.1007/s11227-020-03553-y
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 58 publications
0
11
0
Order By: Relevance
“…The proposed method encrypts the data file before storing it in cloud storage and decrypts using One Time Password (OTP) during the retrieval process. Vishesh P. Gaikwad and et al (2020) had proposed a Chaotic hash function [16] to achieve user anonymity in Telecare Medicine Information System (TMIS). The proposed model incorporates Random Oracle (RO) model for providing security against cyber attacks.…”
Section: Variousmentioning
confidence: 99%
“…The proposed method encrypts the data file before storing it in cloud storage and decrypts using One Time Password (OTP) during the retrieval process. Vishesh P. Gaikwad and et al (2020) had proposed a Chaotic hash function [16] to achieve user anonymity in Telecare Medicine Information System (TMIS). The proposed model incorporates Random Oracle (RO) model for providing security against cyber attacks.…”
Section: Variousmentioning
confidence: 99%
“…The majority of authentication schemes are vulnerable to well-known security flaws. [1][2][3][4][5][6][10][11][12][13][19][20][21][22] Furthermore, to combat replay attacks, current authentication systems employ timestamps. However, it necessitates the use of additional clocks, which causes a clock synchronization problem.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To afford a secure mutual authentication for TMIS, we investigated the security strength of several authentication techniques in the literature. The majority of authentication schemes are vulnerable to well‐known security flaws 1‐6,10‐13,19‐22 . Furthermore, to combat replay attacks, current authentication systems employ timestamps.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations