2015
DOI: 10.1007/s10916-015-0276-5
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Robust User Authenticated Key Agreement Scheme for Hierarchical Multi-medical Server Environment in TMIS

Abstract: The telecare medicine information system (TMIS) helps the patients to gain the health monitoring facility at home and access medical services over the Internet of mobile networks. Recently, Amin and Biswas presented a smart card based user authentication and key agreement security protocol usable for TMIS system using the cryptographic one-way hash function and biohashing function, and claimed that their scheme is secure against all possible attacks. Though their scheme is efficient due to usage of one-way has… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 33 publications
(28 citation statements)
references
References 53 publications
0
27
0
Order By: Relevance
“…We further assume that the length of ECC point is equal to 320 bits. From the obtained results, we observe that the communication cost of our proposed scheme is lower that the schemes in , but is relatively higher that Amin et al scheme, which suffers from some security weaknesses. Note that the schemes , which can access only a single server, present low communication costs rather than the schemes , which are designed for multi‐server TMIS authentication.…”
Section: Performance Analysis and Comparisonmentioning
confidence: 77%
See 3 more Smart Citations
“…We further assume that the length of ECC point is equal to 320 bits. From the obtained results, we observe that the communication cost of our proposed scheme is lower that the schemes in , but is relatively higher that Amin et al scheme, which suffers from some security weaknesses. Note that the schemes , which can access only a single server, present low communication costs rather than the schemes , which are designed for multi‐server TMIS authentication.…”
Section: Performance Analysis and Comparisonmentioning
confidence: 77%
“…The computation cost comparison of our proposed scheme with some related works in the literature is summarized in Table (). According to the presented results, it is noticeable that our proposed authentication scheme takes less computation cost that all the considered schemes and even the most recent schemes such as and .…”
Section: Performance Analysis and Comparisonmentioning
confidence: 77%
See 2 more Smart Citations
“…We conduct a formal analysis with random oracle model, that validates the argument in the favor of a secure model [37][38][39][40]. For this purpose, we can define the hash function h(.)…”
Section: Formal Security Analysismentioning
confidence: 83%