[1] 彭彦彬, 田野, 彭新光. 一种端到端的医疗无线体域网轻量认证协议[J]. 计算机工程, 2017, 43(6):73-77. Peng Yanbin, Tian Ye, Peng Xinguang. An end-to-end lightweight authentication protocol for medical wireless body area network[J]. Computer Engineering, 2017, 43(6):73-77.
[2] Hu F, Jiang M, Wagner M, et al. Privacy-preserving telecardiology sensor networks:toward a low-cost portable wireless hardware/software codesign[J]. IEEE Transactions on Information Technology, 2007(11):619-627.
[3] Le XH, Khalid M. An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare[J]. Journal of Networks, 2011, 6(3):355-364.
[4] He D, Kumar N, Chen J, et al. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks[J]. Multimedia Systems, 2015, 21(1):49-60.
[5] Yeh H L, Chen T H, Liu P, et al. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography[J]. Sensors, 2011, 11(5):4767-4779.
[6] Shi W, Gong P. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography[J]. International Journal of Distributed Sensor Networks, 2013:51-59.
[7] Wu Z, Lee Y, Lai F, et al, A secure authentication scheme for telecare medicine information systems[J]. Journal of Medical Systems, 2012, 36(3):1529-1535.
[8] He D, Chen Jianhua, Zhang Rui. A more secure authentication scheme for telecare medicine information systems[J]. Journal of Medical Systems, 2012, 36(3):1989-1995.
[9] Wei J, Hu X, Liu W. An improved authentication scheme for telecare medicine information systems[J]. Journal of Medical Systems, 2012, 36(6):3597-3604.
[10] Abdellaoui A, Khamlichi Y I. A robust authentication scheme for telecare medicine information system[J]. Procedia Computer Science, 2016(98):584-589.
[11] Chen C, Mitchell Chris J, Tang S. Ubiquitous one-time password service using the generic authentication architecture[J]. Mobile Networks and& Applications, 2013, 18(5):738-747.
[12] Lin X, Sun L. Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications[J]. Computers & Security, 2015, 48(9):142-149.
[13] Cao Tianjie, Zhai Jingxuan. Improved dynamic ID-based authentication scheme for telecare medical information systems[J]. Journal of Medical Systems, 2013, 37(2):1-7.
[14] Mohammad M, Safiyyeh A. A survey and taxonomy of the authentication schemes in telecare medicine information systems[J]. JNCA, 2017(87):1-19.
[15] Hankerson D, Vanstone S, Menezes A J. Guide to elliptic curve cryptography[M]. New York:Springer-Verlag, 2004.
[16] Miracl Library[EB/OL]. Distributed Cryptography Company, 2018. https://libraries.docs.miracl.com. |