Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare

    Chien-Ming Chen1,*, Shuangshuang Liu1, Shehzad Ashraf Chaudhry2, Yeh-Cheng Chen3, Muhammad Asghar khan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.1, pp. 307-329, 2022, DOI:10.32604/cmes.2022.018749 - 24 January 2022

    Abstract With the rise of the Internet of Things (IoT), the word “intelligent medical care” has increasingly become a major vision. Intelligent medicine adopts the most advanced IoT technology to realize the interaction between patients and people, medical institutions, and medical equipment. However, with the openness of network transmission, the security and privacy of information transmission have become a major problem. Recently, Masud et al. proposed a lightweight anonymous user authentication protocol for IoT medical treatment, claiming that their method can resist various attacks. However, through analysis of the protocol, we observed that their protocol cannot More >

  • Open Access

    ARTICLE

    Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems

    Munayfah Alanazi*, Shadi Nashwan

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 703-725, 2022, DOI:10.32604/csse.2022.022962 - 04 January 2022

    Abstract Wireless medical sensor networks (WMSNs) play a significant role in increasing the availability of remote healthcare systems. The vital and physiological data of the patient can be collected using the WMSN via sensor nodes that are placed on his/her body and then transmitted remotely to a healthcare professional for proper diagnosis. The protection of the patient’s privacy and their data from unauthorized access is a major concern in such systems. Therefore, an authentication scheme with a high level of security is one of the most effective mechanisms by which to address these security concerns. Many… More >

Displaying 1-10 on page 1 of 2. Per Page