2015
DOI: 10.1007/s10916-015-0258-7
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity

Abstract: Telecare medical information system (TMIS) makes an efficient and convenient connection between patient(s)/user(s) and doctor(s) over the insecure internet. Therefore, data security, privacy and user authentication are enormously important for accessing important medical data over insecure communication. Recently, many user authentication protocols for TMIS have been proposed in the literature and it has been observed that most of the protocols cannot achieve complete security requirements. In this paper, we h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
97
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 86 publications
(97 citation statements)
references
References 48 publications
0
97
0
Order By: Relevance
“…Here, we analyze that our protocol can defy all the relevant security attacks. In this regard, we define some valid assumptions [2,10,20] as follows.…”
Section: Discussion About the Securitymentioning
confidence: 99%
See 4 more Smart Citations
“…Here, we analyze that our protocol can defy all the relevant security attacks. In this regard, we define some valid assumptions [2,10,20] as follows.…”
Section: Discussion About the Securitymentioning
confidence: 99%
“…Therefore, A intercepts, deletes, modifies, reroutes, and resends the transmitted message. It is worth noting that A cannot intercept any information from the secure network [10].…”
Section: Definitionmentioning
confidence: 99%
See 3 more Smart Citations