2013
DOI: 10.1007/s10916-012-9897-0
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems

Abstract: The telecare medical information system (TMIS) aims to establish telecare services and enable the public to access medical services or medical information at remote sites. Authentication and key agreement is essential to ensure data integrity, confidentiality, and availability for TMIS. Most recently, Chen et al. proposed an efficient and secure dynamic ID-based authentication scheme for TMIS, and claimed that their scheme achieves user anonymity. However, we observe that Chen et al.'s scheme achieves neither … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 97 publications
(55 citation statements)
references
References 20 publications
0
55
0
Order By: Relevance
“…A privacy enhanced authentication scheme for the medical information system is proposed in [67], however, in [68] by Kumari et al proposed scheme for verifying the attack, online password guessing attack and imitation attack. The digital signature is investigating in [69] to ensure the security of information that can ensure confidentiality of information.…”
Section: Wbans Design Challenges and Open Issuementioning
confidence: 99%
“…A privacy enhanced authentication scheme for the medical information system is proposed in [67], however, in [68] by Kumari et al proposed scheme for verifying the attack, online password guessing attack and imitation attack. The digital signature is investigating in [69] to ensure the security of information that can ensure confidentiality of information.…”
Section: Wbans Design Challenges and Open Issuementioning
confidence: 99%
“…PDA collects the measured health items , where = ( , 1 , 2 , … , 6 ). Then performs an encryption function () to get the ciphertext C and uploads to the cloud server CS through the public channel.…”
Section: Patient Health Items Upload Phasementioning
confidence: 99%
“…In this section, we make a comprehensive comparative analysis of our scheme and the related literature [6] and [7]. For the convenience of description, we referred to the literature [6] as SMDEP, literature [7] as SCAMS.…”
Section: Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations