Abstract | ||
---|---|---|
•The existing security protocols for telemedicine do not capture user mobility.•How to capture both user mobility and user anonymity is a challenging problem.•Our work for the first time provides a very efficient security solution for user mobility and user anonymity based on symmetric-key schemes.•Our protocols meet all essential security requirements and are featured with patient anonymity, data confidentiality, data integrity, freshness, and mutual authentication. |
Year | DOI | Venue |
---|---|---|
2018 | 10.1016/j.jbi.2017.12.011 | Journal of Biomedical Informatics |
Keywords | Field | DocType |
Telemedicine,Security,Authentication,Anonymity,Mobility | Health care,Telemedicine,Mutual authentication,Wireless,Information retrieval,Confidentiality,Computer security,Computer science,Data integrity,Anonymity,Secure communication | Journal |
Volume | ISSN | Citations |
78 | 1532-0464 | 0 |
PageRank | References | Authors |
0.34 | 15 | 2 |