A survey of authentication schemes in telecare medicine information systems

MU Aslam, A Derhab, K Saleem, H Abbas… - Journal of medical …, 2017 - Springer
E-Healthcare is an emerging field that provides mobility to its users. The protected health
information of the users are stored at a remote server (Telecare Medical Information System) …

An improved and provably secure privacy preserving authentication protocol for SIP

SA Chaudhry, H Naqvi, M Sher, MS Farash… - Peer-to-Peer Networking …, 2017 - Springer
Abstract Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any
multimedia based application or IP-based telephony service that requires signaling. SIP …

Privacy-preserved, provable secure, mutually authenticated key agreement protocol for healthcare in a smart city environment

S Khatoon, SMM Rahman, M Alrubaian… - IEEE access, 2019 - ieeexplore.ieee.org
Smart home systems can provide health care services for people with special needs in their
own homes. Briefly defined, such a smart home has special electronics to enable the remote …

A novel encryption scheme for colored image based on high level chaotic maps

M Mollaeefar, A Sharif, M Nazari - Multimedia Tools and Applications, 2017 - Springer
In the following paper, the novel method for color image encryption has proposed based on
high level chaotic maps. We introduced two novel chaotic maps “Cosinus-Arcsinus (CA)” …

A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme

S Barman, HPH Shum, S Chattopadhyay… - IEEE …, 2019 - ieeexplore.ieee.org
Smart card-based remote authentication schemes are widely used in multi-medical-server-
based telecare medicine information systems (TMISs). Biometric is one of the most …

ITSSAKA-MS: An improved three-factor symmetric-key based secure AKA scheme for multi-server environments

Z Ali, S Hussain, RHU Rehman, A Munshi… - IEEE …, 2020 - ieeexplore.ieee.org
A variety of three-factor smart-card based schemes, specifically designed for telecare
medicine information systems (TMIS) are available for remote user authentication. Most of …

A mutual authentication framework for wireless medical sensor networks

J Srinivas, D Mishra, S Mukhopadhyay - Journal of medical systems, 2017 - Springer
Wireless medical sensor networks (WMSN) comprise of distributed sensors, which can
sense human physiological signs and monitor the health condition of the patient. It is …

An enhanced privacy preserving remote user authentication scheme with provable security

SA Chaudhry, MS Farash, H Naqvi… - Security and …, 2015 - Wiley Online Library
Very recently, Kumari et al. proposed a symmetric key and smart card‐based remote user
password authentication scheme to enhance Chung et al.'s scheme. They claimed their …

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security

MS Farash, SA Chaudhry, M Heydari… - International Journal …, 2017 - Wiley Online Library
Ubiquitous networks provide roaming service for mobile nodes enabling them to use the
services extended by their home networks in a foreign network. A mutual authentication …

A provably secure RFID authentication protocol based on ECQV for the medical internet of things

AK Agrahari, S Varma - Peer-to-Peer Networking and Applications, 2021 - Springer
Abstract Radio Frequency Identification (RFID) is an emerging technology that is used for
the unique identification of objects. RFID can be used in different application domains …