|
1.World Health Organization. The top 10 causes of death Available online:https://www.who.int/news-room/fact-sheets/detail/the-top-10-causes-of-death. (accessed on 27.12.2018.) 2.M. Qi, J. Chen & Y. Chen, A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC, Computer methods and programs in biomedicine, 164 (2018): 101-109. 3.M. Masdari & S. Ahmadzadeh, A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems, Journal of Network and Computer Applications, 87 (2017): 1-19. 4.D. Puthal, R. Ranjan, A. Nanda, P. Nanda, P. P. Jayaraman & A. Y. Zomaya, Secure authentication and load balancing of distributed edge datacenters, Journal of Parallel and Distributed Computing, 124 (2019): 60-69 5.S. J. Iribarren, W. Brown III, R. Giguere, P. Stone, R. Schnall, N. Staggers & A. Carballo-Diéguez, Scoping review and evaluation of SMS/text messaging platforms for mHealth projects or clinical interventions, International journal of medical informatics, 101(2017): 28-40. 6.R. Song. Advanced smart card based password authentication protocol, Comput Stand Interfaces, 32(5-6)(2010):321-325 7.S. Chatterjee, S. Roy, A. K. Das, S. Chattopadhyay, N. Kumar, A. G. Reddy & Y. Park. On the design of fine grained access control with user authentication scheme for telecare medicine information systems, IEEE Access, 5(2017): 7012-7030. 8.R. Amin, S. H. Islam, G. P. Biswas, M. K. Khan & N. Kumar, A robust and anonymous patient monitoring system using wireless medical sensor networks, Future Generation Computer Systems, 80(2018): 483-495. 9.P. Mohit, R. Amin & G. P. Biswas, Design of authentication protocol for wireless sensor network-based smart vehicular system, Vehicular Communications, 9 (2017): 64-71. 10.M. Wazid, A. K. Das, S. Kumari, X. Li & F. Wu, Design of an efficient and provably secure anonymity preserving three‐factor user authentication and key agreement scheme for TMIS, Security and Communication Networks, 9(13) (2016): 1983-2001. 11.A. K. Sutrala, V. Das, M. Odelu, Wazid & S. Kumari, Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems. Computer methods and programs in biomedicine, 135(2016): 167-185. 12.C. L. Chen, T. T. Yang & T. F. Shih, A secure medical data exchange protocol based on cloud environment, Journal of medical systems, 38(9) (2014), 112. 13.S. Y. Chiou, Z. Ying & J. Liu, Improvement of a privacy authentication scheme based on cloud for medical environment, Journal of medical systems, 40(4) (2016): 101. 14.P. Mohit, R. Amin, A. Karati, G. P. Biswas & M. K. Khan, A standard mutual authentication protocol for cloud computing based health care system, Journal of medical systems, 41(4)(2017): 50. 15.V. Kumar, S. Jangirala & M. Ahmad, An efficient mutual authentication framework for healthcare system in cloud computing. Journal of medical systems, 42(8) (2018): 142. 16.C. T. Li, D. H. Shih & C. C. Wang, Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems, Computer methods and programs in biomedicine, 157(2018): 191-203. 17.A. H. Moon, U. Iqbal & G. M. Bhat, Implementation of Node Authentication for WSN using Hash Chains, Procedia Computer Science, 89(2016): 90-98. 18.Y. P. Liao & C. M. Hsiao, A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol, Ad Hoc Networks, 18(2014): 133-146. 19.V. Odelu, A. K. Das & A. Goswami, An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card, Journal of Information Security and Applications, 21(2015): 1-19. 20.H. L. Yeh, T. H. Chen & W. K. Shih, Robust smart card secured authentication scheme on SIP using elliptic curve cryptography, Computer Standards & Interfaces, 36(2)(2014): 397-402. 21.S. K. Shankar, A. S. Tomar & G. K. Tak, Secure medical data transmission by using ECC with mutual authentication in WSNs, Procedia Computer Science, 70(2015): 455-461. 22.P. Chandrakar & H. Om, A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC, Computer Communications, 110(2017): 26-34. 23.M. Burrows, M. Abadi, R. Needham, “A logic of authentication”, Proceedings of the Royal Society, 426(1871) (1989):233-271. 24.O. P. Van, Extending cryptographic logics of belief to key agreement protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, ACM, (1993): 232-243. 25.M. J. Marcus, 5G and IMT for 2020 and beyond, IEEE Wireless Communications, 22(4) (2015):2-3.
|