REFERENCES:
1.
C.-T.
Li, D.-H. Shih, C.-C. Wang, Cloud-assisted mutual authentication and privacy preservation
protocol for telecare medical information systems, Computer methods and programs
in biomedicine 157 (2018) 191–203
2.
Kumar,
V., Ahmad, M., Kumari, A., A Secure Elliptic Curve Cryptography Based Mutual Authentication
Protocol for Cloud-assisted TMIS, Telematics and Informatics (2018).
3.
CSA,
“The notorious nine cloud computing top threats in 2013,” The Notorious Nine Cloud
Computing Top Threats in2013: pdf.
4.
Patra, M. R.; Das, R. K.; Padhy, R. P. CRHIS:
Cloud Based Rural Healthcare Information System. In Proceedings of the
6th International Conference on Theory and
Practice of Electronic Governance; ACM: Albany New York
USA, 2012; pp 402–405.
5.
C.-L.
Chen, T.-T. Yang, T.-F. Shih, A secure medical data exchange protocol based on cloud
environment, Journal of medical systems 38 (9) (2014) 112
6.
C.-T.
Li, C.-C. Lee, C.-C. Wang, T.-H. Yang, S.-J. Chen, Design flaws in a secure medical
data exchange protocol based on cloud environments, in: International Conference
on Algorithms and Architectures for Parallel Processing, Springer, 2015, pp. 435–444.
7.
R.
Amin, S. H. Islam, G. Biswas, M. K. Khan, M. S. Obaidat, Design and analysis of
an enhanced patient-server mutual authentication protocol for telecare medical information
system, Journal of medical systems 39 (11) (2015) 137.
8.
Wu,
F., and Xu, L., Security analysis and improvement of a privacy authentication scheme
for telecare medical information systems. J. Med. Syst 37(4):1–9, 2012. doi:10.1007/s10916-013-9958-z
9.
Wen,
F., and Guo, D., An improved anonymous authentication scheme for telecare medical
information systems.J. Med. Syst. 38(5):26, 2014. doi:10.1007/s10916-014-0026-0
10. Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang,
H., and He, L., A secure and efficient authentication and key agreement scheme based
on ecc for telecare medicine information systems. J. Med. Syst. 38(1):9994, 2013.
doi:10.1007/s10916-013-9994-8
11. D. He, N. Kumar, J. Chen, C.-C. Lee,
N. Chilamkurti, S.-S. Yeo, Robust anonymous authentication protocol for health-care
applications using wireless medical sensor networks, Multimedia Systems 21 (1) (2015)
49–60.
12. J. Srinivas, D. Mishra, S. Mukhopadhyay,
A mutual authentication framework for wireless medical sensor networks, Journal
of medical systems 41 (5) (2017) 80
13. C.-L. Chen, T.-T. Yang, M.-L. Chiang,
T.-F. Shih, A privacy authentication scheme based on cloud for medical environment,
Journal of medical systems 38 (11) (2014) 143.
14. S.-Y. Chiou, Z. Ying, J. Liu, Improvement
of a privacy authentication scheme based on cloud for medical environment, Journal
of medical systems 40 (4) (2016) 101.
15. P. Mohit, R. Amin, A. Karati, G. Biswas,
M. K. Khan, A standard mutual authentication protocol for cloud computing based
health care system, Journal of medical systems 41 (4) (2017) 50
16. V. Kumar, S. Jangirala, M. Ahmad, An
efficient mutual authentication framework for healthcare system in cloud computing,
Journal of medical systems 42 (8) (2018) 142
17. C.-T. Li, D.-H. Shih, C.-C. Wang, Cloud-assisted
mutual authentication and privacy preservation protocol for telecare medical information
systems, Computer methods and programs in biomedicine 157 (2018) 191–203