2018
DOI: 10.1007/s10916-018-1099-y
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Protection for Point-of-Care Using Chaotic Maps-Based Authentication and Key Agreement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…Dharminder et al discussed authorized access to healthcare services [35]. Zhang et al [36], Zhang et al…”
Section: Medical Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…Dharminder et al discussed authorized access to healthcare services [35]. Zhang et al [36], Zhang et al…”
Section: Medical Privacymentioning
confidence: 99%
“…Dharminder et al discussed authorized access to healthcare services [35]. Zhang et al [36], Zhang et al [37], and Sureshkumar et al [38] designed authentication and key agreement for telemedicine system. Baker et al [8], Guo et al [39], and Anwar et al [11] focused on telemedicine using IoT, blockchain, and 5G technology and proposed framework or scheme.…”
Section: Medical Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…In this portion, we will contrast the computation of our proposed scheme with other schemes [15], [39], [20], [19], [40] in table 9 and figure 2. Since the time for computing XOR operation and string concatenation is ignored as compared with the other operations [16], [26], [40], we only consider the time to calculate one-way hash function, Chebyshev polynomial and symmetric key encryption/ decryption. For comparing the computation cost with other schemes, all operations were implemented at IDEA jdk 1.8.0_60 using an Intel(R)Core(TM)i5-42102M CPU @ 2.60GHz with 8G memory in win7 64-bit.…”
Section: B Computation Comparisionmentioning
confidence: 99%
“…Truong et al [14] also showed the scheme [13] is not able to achieve perfect forward security. The anonymity protection is very vital in three-party communication wireless sensor network [15], medical information networks [16], [17], and roaming authentication networks [18]. Xie et al [19] first carried out three-party password authenticated scheme without utilizing timestamp based on chaotic maps instead of modular exponentiation and scalar multiplication on an elliptic curve.…”
Section: Introductionmentioning
confidence: 99%