2013
DOI: 10.1007/s10916-013-9973-0
|View full text |Cite
|
Sign up to set email alerts
|

An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 47 publications
(39 citation statements)
references
References 29 publications
0
39
0
Order By: Relevance
“…Moreover, they put forwarded another user authentication and key agreement scheme for TMIS to fix the above security weaknesses. Recently, Li et al [32] described that Lee et al's chaotic maps based user authentication scheme [30] has two security weaknesses -service misuse attack for non-registered users and lack of user identity in the authentication phase, and then put forwarded an enhanced scheme. In 2015, Wang et al [45] described that Lin's scheme [38] suffer from user anonymity, impersonation attack and also proposed a counter measure to resolve the mentioned security weaknesses.…”
Section: Literature Survey On Existing Authentication Scheme For Tmismentioning
confidence: 99%
“…Moreover, they put forwarded another user authentication and key agreement scheme for TMIS to fix the above security weaknesses. Recently, Li et al [32] described that Lee et al's chaotic maps based user authentication scheme [30] has two security weaknesses -service misuse attack for non-registered users and lack of user identity in the authentication phase, and then put forwarded an enhanced scheme. In 2015, Wang et al [45] described that Lin's scheme [38] suffer from user anonymity, impersonation attack and also proposed a counter measure to resolve the mentioned security weaknesses.…”
Section: Literature Survey On Existing Authentication Scheme For Tmismentioning
confidence: 99%
“…Accessing data on real time (Zheng et al 2013) and labeling data through crowd sourcing (Feng et al 2014) are of great importance for realizing scalable activity recognition model across multiple users and premises while providing just-intime intervention and proactive healthcare decision to the target population. Meeting the quality of service for inferring the activity of the users and trading the delicate balance between cost and accuracy in presence of multiple healthcare activity recognition applications have also been investigated in Roy et al (2009, 2011, 2012), Lin et al (2015a) and Lee et al (2013).…”
Section: Related Workmentioning
confidence: 99%
“…However, LPR does not provide the data-level privacy protection. The work [19] found out that Lu et al 's protocol in [7] still has some secure flaws such as user anonymity and mutual authentication, and it presents an improved mobile-healthcare emergency system based on extended chaotic maps for applications of wireless body sensor networks (BSNs).…”
Section: Related Workmentioning
confidence: 99%