2021
DOI: 10.1007/s12083-021-01260-w
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…In this section, we employ BAN logic, a widely recognized security analysis technique used in numerous studies such as [30] and [31], to conduct an exhaustive evaluation of our proposed scheme. By leveraging the thorough framework of BAN logic, which encompasses analysis rules, goals, assumptions, and derivations, we are able to rigorously assess the scheme's robustness against various security vulnerabili-ties.…”
Section: B Formal Security Analysis Using Ban Logicmentioning
confidence: 99%
“…In this section, we employ BAN logic, a widely recognized security analysis technique used in numerous studies such as [30] and [31], to conduct an exhaustive evaluation of our proposed scheme. By leveraging the thorough framework of BAN logic, which encompasses analysis rules, goals, assumptions, and derivations, we are able to rigorously assess the scheme's robustness against various security vulnerabili-ties.…”
Section: B Formal Security Analysis Using Ban Logicmentioning
confidence: 99%
“…BhanuChander et al 20 presented a safe and light RFID‐tag‐based authentication technique to increase security in the Telecare medicine information system while respecting privacy. Yulei Chen et al 21 proposed ECC based on efficient and privacy‐preserving mutual authentication with a key agreement scheme for telecare medicine information system. It uses a formal method under the random oracle (RO) model and uses the traditional heuristic discussion to prove the strength of the scheme against known attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Simultaneously, authentication schemes are used in many areas to ensure secure communications [2][3][4] . So far, many authentication and key agreement schemes have been proposed for TMIS [5][6][7][8][9][10] .…”
Section: Introductionmentioning
confidence: 99%