Login / Signup
Cryptanalysis of Khatoon et al.'s ECC-based Authentication Protocol for Healthcare Systems.
Mahdi Nikooghadam
Haleh Amintoosi
Published in:
CoRR (2019)
Keyphrases
</>
authentication protocol
healthcare systems
security analysis
secret key
hash functions
public key
smart card
authentication scheme
lightweight
signature scheme
electronic health records
user authentication
security requirements
security protocols
rfid tags
encryption scheme
database
information systems