Open Access
Wuhan Univ. J. Nat. Sci.
Volume 28, Number 6, December 2023
Page(s) 531 - 540
Published online 15 January 2024
  1. Ryu J, Oh J, Kwon D, et al. Secure ECC-based three-factor mutual authentication protocol for telecare medical information system[J]. IEEE Access, 2022, 10: 11511-11526. [CrossRef] [Google Scholar]
  2. Li R, Kang B Y, Mai K Q . Analysis and improvement on a Hash-based authentication scheme for multi-server architecture[J]. Wuhan University Journal of Natural Sciences, 2021, 26(5): 394-404. [Google Scholar]
  3. Du J Q, Kang B Y, Han Y B. Improvement on a biometric based user authentication scheme in wireless sensor networks using smart cards[J]. Wuhan University Journal of Natural Sciences, 2020, 25(2): 155-161. [Google Scholar]
  4. Kang B Y, Du J Q, Si L, et al. Analysis and improvement on a mobile payment protocol with outsourced verification in cloud service[J]. Wuhan University Journal of Natural Sciences, 2019, 24(3): 223-228. [CrossRef] [Google Scholar]
  5. Radhakrishnan N, Muniyandi A P. Dependable and provable secure two-factor mutual authentication scheme using ECC for IoT-based telecare medical information system[J]. Journal of Healthcare Engineering, 2022, 2022:9273662. [CrossRef] [Google Scholar]
  6. Shamshad S, Ayub M F, Mahmood K, et al. An identity-based authentication protocol for the telecare medical information system (TMIS) using a physically unclonable function[J]. IEEE Systems Journal, 2022, 16(3): 4831-4838. [NASA ADS] [CrossRef] [Google Scholar]
  7. Tanveer M, Alkhayyat A, Chaudhry S A, et al. REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system[J]. IEEE Access, 2022, 10: 23008-23021. [NASA ADS] [CrossRef] [Google Scholar]
  8. Chen Y L, Chen J H. An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system[J]. Peer-to-Peer Networking and Applications, 2022, 15(1):516-528. [CrossRef] [Google Scholar]
  9. Zhai X Y, Wang J. A multi-server biometric authentication scheme based on extended chaotic map for telecare medical information system[J]. Multimedia Tools and Applications, 2022, 81(28): 40159-40179. [CrossRef] [Google Scholar]
  10. Chen Y L, Chen J H. A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography[J]. Multimedia Tools and Applications, 2023, 82(11): 16009-16032. [CrossRef] [PubMed] [Google Scholar]
  11. Chaudhry S A, Naqvi H, Shon T, et al. Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems[J]. Journal of Medical Systems, 2015, 39(6): 66. [Google Scholar]
  12. Qiu S M, Xu G A, Ahmad H, et al. A robust mutual authentication scheme based on elliptic curve cryptography for telecare medical information systems[J]. IEEE Access, 2017, 6: 7452-7463. [Google Scholar]
  13. Gupta A, Tripathi M, Shaikh T J, et al. A lightweight anonymous user authentication and key establishment scheme for wearable devices[J]. Computer Networks, 2019, 149: 29-42. [CrossRef] [Google Scholar]
  14. Hajian R, ZakeriKia S, Erfani S H, et al. SHAPARAK: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement[J]. Computer Networks, 2020, 183: 107567. [CrossRef] [Google Scholar]
  15. Yu S, Park K. SALS-TMIS: Secure, anonymous, and lightweight privacy-preserving scheme for IoMT-enabled TMIS environments[J]. IEEE Access, 2022, 10: 60534-60549. [NASA ADS] [CrossRef] [Google Scholar]
  16. Dolev D, Yao C C. On the security of public key protocols[C]// Symposium on Foundations of Computer Science. New York: IEEE, 1981. [Google Scholar]
  17. Lee S, Kim S, Yu S, et al. Provably secure PUF-based lightweight mutual authentication scheme for wireless body area networks[J]. Electronics, 2022, 11(23): 3868. [CrossRef] [Google Scholar]
  18. Wang Y B, Liu W R, Li B. An improved authentication protocol for smart healthcare system using wireless medical sensor network[J]. IEEE Access, 2021, 9: 105101-105117. [CrossRef] [Google Scholar]
  19. Lee J Y, Oh J, Park Y. A secure and anonymous authentication protocol based on three-factor wireless medical sensor networks[J]. Electronics, 2023, 12(6): 1368. [CrossRef] [Google Scholar]
  20. Gupta A, Tripathi M, Muhuri S, et al. A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things[J]. Journal of Information Security and Applications, 2022, 68: 103259. [CrossRef] [Google Scholar]
  21. Wu T Y, Wang T, Lee Y Q, et al. Improved authenticated key agreement scheme for fog-driven IoT healthcare system[J]. Security and Communication Networks, 2021, 2021: 6658041. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.