LI Yi, TIAN Yuling. Three-Factor Anonymous Authentication Protocol in Telecare Medicine Information System[J]. Computer Engineering and Applications, 2023, 59(10): 280-287.
[1] AHMADZADEH,SAFIYYEH,MASDARI.A survey and taxonomy of the authentication schemes in telecare medicine information systems[J].Journal of Network and Computer Applications,2017,87(11):1-19.
[2] ALHEJAZI M M,AL-DAHASI E M,SAQIB N A.A new remote user authentication scheme for e-health-care applications using steganography[C]//2019 2nd International Conference on Computer Applications & Information Security,Riyadh,May 1-3,2019.Piscataway:IEEE,2019:1-10.
[3] SAMMOUD A,CHALOUF M A,HAMDI O,et al.A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity[C]//2020 International Wireless Communications and Mobile Computing Conference,Limassol,Jun 15-19,2020.Piscataway:IEEE,2020:1916-1921.
[4] ZHANG Z Z,QI Q Q.An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography[J].Journal of Medical Systems,2014,38(5):1-7.
[5] ZHAO Z G.A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem[J].Journal of Medical Systems,2014,38(5):46.
[6] FARASH M S,NAWAZ O,MAHMOOD K,et al.A provably secure RFID authentication protocol based on elliptic curve for healthcare environments[J].Journal of Medical Systems,2016,40(7):165.
[7] GIRI D,MAITRA T,AMIN R,et al.An efficient and robust RSA-based remote user authentication for telecare medical information systems[J].Journal of Medical Systems,2015,39(1):145.
[8] AMIN R,BISWAS G P.An improved RSA based user authentication and session key agreement protocol usable in TMIS[J].Journal of Medical Systems,2015,39(8):79.
[9] ARSHAD H,RASOOLZADEGAN A.Design of a secure authentication and key agreement scheme preserving user privacy usable in telecare medicine information systems[J].Journal of Medical Systems,2016,40(11):237.
[10] OSTAD-SHARIF A,ABBASINEZHAD-MOOD D,NIKOOGHADAM M.A robust and efficient ECC-based mutual authentication and session key generation scheme for healthcare applications[J].Journal of Medical Systems,2019,43(1):10.
[11] ZHANG L,ZHANG Y,TANG S,et al.Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement[J].IEEE Transactions on Industrial Electronics,2018,65(3):2795-2805.
[12] HSU C L,LE T V,HSIEH M C,et al.Three-factor UCSSO scheme with fast authentication and privacy protection for telecare medicine information systems[J].IEEE Access,2020,8:196553-196566.
[13] RADHAKRISHNAN N,KARUPPIAH M.An efficient and secure remote user mutual authentication scheme using smart cards for telecare medical information systems[J].Informatics in Medicine Unlocked,2019,16(3):1-13.
[14] DHARMINDER D,MISHRA D,LI X.Construction of RSA-based authentication scheme in authorized access to healthcare services[J].Journal of Medical Systems,2020,44(1):6.
[15] DHARMINDER D,KUMAR U,GUPTA P.A construction of aconformal Chebyshev chaotic map based authentication protocol for healthcare telemedicine services[J].Complex and Intelligent Systems,2021,7:2531-2542.
[16] DHARMINDER D,KUNDU N,MISHRA D.Construction of a chaotic map-based authentication protocol for TMIS[J].Journal of Medical Systems,2021,45(8):77.
[17] MISHRA D,DAS A K,MUKHOPADHYAY S.A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards[J].Expert Systems with Applications,2014,41(18):8129-8143.
[18] JIN A T B,LING D N C,GOH A.Biohashing:two factor authentication featuring fingerprint data and tokenised random number[J].Pattern Recognition,2004,37(11):2245-2255.
[19] SHAMSHAD S,AYUB M F,MAHMOOD K,et al.An enhanced scheme for mutual authentication for healthcare services[J].Digital Communications and Networks,2022,8(2):150-161.
[20] ARMANDO A,BASIN D,BOICHUT Y,et al.The AVISPA tool for the automated validation of Internet security protocols and applications[C]//International Conference on Computer Aided Verification,Edinburgh,Jul 6-10,2005.Berlin,Heidelberg:Springer,2005:281-285.
[21] OSTAD-SHARIF A,ARSHAD H,NIKOOGHADAM M,et al.Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme[J].Future Generation Computer Systems,2019,100:882-892.
[22] SRINIVAS J,DAS A K,WAZID M,et al.Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial Internet of things[J].IEEE Transactions on Dependable and Secure Computing,2018,17(6):1133-1146.