A Secure and Resilient Scheme for Telecare Medical Information Systems With Threat Modeling and Formal Verification.
Shaik Shakeel AhamadMohammed AlshehriIsmail KeshtaPublished in: IEEE Access (2022)
Keyphrases
- formal verification
- information systems
- model checking
- automated verification
- model checker
- information technology
- bounded model checking
- authentication scheme
- public key encryption
- program slicing
- symbolic model checking
- secret sharing
- security analysis
- public health
- key distribution
- cryptographic protocols
- health information
- security model
- provably secure
- automated reasoning
- authentication mechanism
- security issues
- health care