An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring.
Prerna MohitPublished in: J. Inf. Secur. Appl. (2021)
Keyphrases
- mutual authentication
- security analysis
- privacy protection
- authentication protocol
- authentication scheme
- rfid tags
- trusted third party
- authentication mechanism
- secret key
- rfid systems
- smart card
- private key
- public key
- privacy preserving
- real time
- third party
- information systems
- key distribution
- user authentication
- security requirements
- security properties
- security issues
- data sharing
- lightweight