2021
DOI: 10.1109/access.2021.3070641
|View full text |Cite
|
Sign up to set email alerts
|

An Anonymous Key Distribution Scheme for Group Healthcare Services in 5G-Enabled Multi-Server Environments

Abstract: Fifth generation (5G) mobile technology enables a new kind of network that provides high peak data rates, ultra-low latency communication and high user density. Electronic healthcare (e-health) allows the data to be stored and shared in a highly efficient and flexible manner. Group e-health services help in improving long-term results of the treatments due to its collaborative characteristic. The services including real-time remote patient monitoring and transmission of large health data files can be facilitat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
30
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 20 publications
(30 citation statements)
references
References 50 publications
(100 reference statements)
0
30
0
Order By: Relevance
“…Furthermore, Lin et al [23] is not free from stolen smart card attacks since users' private credentials are directly stored in the card without being masked. Similarly, the work proposed by Le and Hsu [16] only prevents the smart card capture attacks partially as the adversaries can perform power analysis to obtain passwords of the users [25]. In this way, multiple attacks can be performed once they obtain users' biometrics.…”
Section: A Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Furthermore, Lin et al [23] is not free from stolen smart card attacks since users' private credentials are directly stored in the card without being masked. Similarly, the work proposed by Le and Hsu [16] only prevents the smart card capture attacks partially as the adversaries can perform power analysis to obtain passwords of the users [25]. In this way, multiple attacks can be performed once they obtain users' biometrics.…”
Section: A Related Workmentioning
confidence: 99%
“…Thus, three-factor authentication mechanism in their work will become ineffective. Le and Hsu [16] also did not provide password update solution to enhance the security. This solution was proposed in another anonymous three-factor authentication protocol introduced by Xu et al [26].…”
Section: A Related Workmentioning
confidence: 99%
See 3 more Smart Citations