2015
DOI: 10.1109/tr.2015.2429271
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection

Abstract: As our aging population significantly grows, personal health monitoring is becoming an emerging service and can be accomplished by large-scale, low-power sensor networks, such as Zigbee networks. However, collected medical data may reveal patient privacy, and should be well protected. We propose a Hierarchical and Dynamic Elliptic Curve Cryptosystem based self-certified public key scheme (HiDE) for medical data protection. To serve a large amount of sensors, HiDE provides a hierarchical cluster-based framework… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
16
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 27 publications
0
16
0
Order By: Relevance
“…In order to improve the both schemes, Amin and Biswas introduced a secure three‐factor authentication and key agreement scheme for TMISs that can offer the user anonymity. Yet another ECC‐based scheme was presented in Tseng et al Nonetheless, careful investigation of their work indicates that in their scheme, there is no key confirmation and it cannot guarantee the message integrity.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In order to improve the both schemes, Amin and Biswas introduced a secure three‐factor authentication and key agreement scheme for TMISs that can offer the user anonymity. Yet another ECC‐based scheme was presented in Tseng et al Nonetheless, careful investigation of their work indicates that in their scheme, there is no key confirmation and it cannot guarantee the message integrity.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we compare the performance and features of the proposed scheme with those of related ones, including the schemes of Ravanbakhsh and Nazari, Arshad and Nikooghadam, Tan, Giri et al, Amin and Biswas, Arshad et al, Bin Muhaya, Islam and Khan, Amin and Biswas, Lu et al, Xu et al, Tseng et al, and Chaudhry et al…”
Section: Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…More discussions about related work and generic centralized and decentralized access control mechanisms can be found in our earlier conference paper …”
mentioning
confidence: 99%