Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6891011 | Computer Methods and Programs in Biomedicine | 2018 | 13 Pages |
Abstract
Conclusions: We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Science (General)
Authors
Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang,