[1]Masdari M, Ahmadzadeh S. A survey and taxonomy of the authentication schemes in telecare medicine information systems[J]. Journal of Network and Computer Applications, 2017, 87(11): 119[2]Khan F A, Ali A, Abbas H, et al. A cloud based healthcare framework for security and patients’ data privacy using wireless body area networks[J]. Procedia Computer Science, 2014, 34: 511517[3]Aslametal M U, Derhab A, Saleem K, et al. A survey of authentication schemes in telecare medicine information systems[J]. Journal of Medical Systems, 2017, 41(1): 126[4]Sun Qianqian, Zhou Shoujun. The current situation, problems and development countermeasures of telemedicine in China[J]. Journal of Nanjing Medical University (Social Science Edition), 2022, 22(1): 2530[5]Lamport L. Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24(11): 770772[6] Chang ChinChen, Wu TzongChen. Remote password authentication with smartcards[J]. IEE ProceedingsE: Computers and Digital Techniques, 1993, 138(3): 165168[7]Chien HungYu, Jan JinnKe, Tseng YuhMin. An efficient and practical solution remote authentication: smartcard[J]. Computers and Security, 2002, 21(4): 372375[8] Hsu ChienLung. Security of Chien et al’s remote user authentication scheme using smart cards[J]. Computer Standards and Interfaces, 2004, 26(3): 167169[9]Chen ChinLing, Lin YuFan, Wang NengChung, et al. An improvement on Hsiang and Shih’s remote user authentication scheme using smart cards[C] Proc of the 12th ACIS Int Conf on Software Engineering, Artificial Intelligence, Networking and ParallelDistribute Computing. Piscataway, NJ: IEEE, 2011: 5357[10]Wu Zhenyu, Lee YuehChun, Lai Feipei, et al. A secure authentication scheme for telecare medicine information systems[J]. Journal of Medical Systems, 2012, 36(3): 15291535[11]He Debiao, Chen Jianhua, Zhang Rui. A more secure authentication scheme for telecare medicine information systems[J]. Journal of Medical Systems, 2012, 36(3): 19891995[12]Wei Jianghong, Hu Xuexian, Liu Wenfen. An improved authentication scheme for telecare medicine information systems[J]. Journal of Medical Systems, 2012, 36(6): 35973604[13]Zhu Zhian. An efficient authentication scheme for telecare medicine information systems[J]. Journal of Medical Systems, 2012, 36(6): 38333838[14]Khan M K, Kumari S. An authentication scheme for secure access to healthcare services[J]. Journal of Medical Systems, 2013, 37(4): 99549966[15]Giri D, Maitra T, Amin R, et al. An efficient and robust RSAbased remote user authentication for telecare medical information systems[J]. Journal of Medical Systems, 2015, 39(1): 145154[16]Radhakrishnan N, Karuppiah M. An efficient and secure remote user mutual authentication scheme using smart cards for telecare medical information systems[J]. Informatics in Medicine Unlocked, 2018, 16: 1009210103[17]Lee TianFu , Chang IPin, Lin TsungHung, et al. A secure and efficient passwordbased user authentication scheme using smart cards for the integrated EPR information system[J]. Journal of Medical Systems, 2013, 37(3): 99419948[18]Li Chunta, Shih Dongher, Wang Chuncheng. Cloudassisted mutual authentication and privacy preservation protocol for telecare medical information systems[J]. Computer Methods and Programs in Biomedicine, 2018, 157: 191203[19]Kumar V, Ahmad M, Kumari A. A secure elliptic curve cryptography based mutual authentication protocol for cloudassisted TMIS[J]. Telematics and Informatics, 2019, 38: 100117[20]Li Xiaowei, Yang Dengqi, Zeng Xing, et al. Comments on “Provably secure dynamic idbased anonymous twofactor authenticated key exchange protocol with extended security model”[J]. IEEE Trans on Information Forensics and Security, 2019, 14(12): 33443345[21]Li Chunta, Hwang M S, Chu Y P. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks[J]. Computer Communications, 2008, 31(12): 28032814[22]Qi Mingping, Chen Jianhua. New robust biometricsbased mutual authentication scheme with key agreement using elliptic curve cryptography[J]. Multimedia Tools and Applications, 2018, 77(1): 2333523351[23]Sahoo S S, Mohanty S, Majhi B. A secure three factor based authentication scheme for health care systems using IoT enabled devices[J]. Journal of Ambient Intelligence and Humanized Computing, 2021,12(15): 14191434[24]Amin R, Biswas G P. Asecure threefactor user authentication and key agreement protocol for TMIS with user anonymity[J]. Journal of Medical Systems, 2015, 39(8): 119[25]OstadSharif A, AbbasinezhadMood D, Nikooghadam M. An enhanced anonymous and unlinkable user authentication and key agreement protocol for TMIS by utilization of ECC[J]. International Journal of Communication Systems, 2019, 32(5): 39133936
|