Authentication using Elliptical Curve Cryptography for e-Healthcare System
Abstract
Full Text:
PDFReferences
Masoumeh Safkhani and Athanasios Vasilakos. A new secure authentication protocol for telecare medicine information system and smart campus. Digital Object Identifier,2019
Muhammad Umair Aslam, Abdelouahid Derhab, Kashif Saleem. A survey of authentication schemes in telecare medicine information systems. Springer Science+Business Media, 2016
Iskandar Setiadi, Elliptic Curve Cryptography: Algorithms and Implementation Analysis over Coordinate Systems.In: https://www.researchgate.net/publication/268688957,2014
Maitra, T., Obaidat, M.S., Islam, S. H., Giri, D., and Amin, R : Security analysis and design of an efficient ecc-based two –factor password authentication scheme. Security and Communication Networks (2016) n/a-n/aSec 1596 doi:10.1002/sec.1596.
Wang, D., Wang, P. On the anonymity of two-factor authentication schemes for wireless sensor network: attack, principal and solution.Comput.Netw.2014.73:41-57p
Khan, F.A. et al. A cloud-based healthcare framework for security and patient’s data privacy using wireless body area networks. In: Procedia Computer Science.2014. 34:511-517p.
Zhu, Z. An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 2012.36(6):3833-3838p.
Refbacks
- There are currently no refbacks.