Mobile health applications for disease screening and treatment support in low-and middle-income countries: A narrative review

E Osei, TP Mashamba-Thompson - Heliyon, 2021 - cell.com
The advances in mobile technologies and applications are driving the transformation in
health services delivery globally. Mobile phone penetration is increasing exponentially in …

A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems

M Masdari, S Ahmadzadeh - Journal of Network and Computer …, 2017 - Elsevier
Abstract A Telecare Medical Information System (TMIS) enables doctors and physicians at a
medical center to provide remote care via Internet to the registered patients at any place …

Secure ECC-based three-factor mutual authentication protocol for telecare medical information system

J Ryu, J Oh, D Kwon, S Son, J Lee, Y Park… - IEEE Access, 2022 - ieeexplore.ieee.org
In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting
attention. TMIS is one of the technologies used in Wireless Body Area Network (WBAN) and …

LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT

SF Aghili, H Mala, M Shojafar, P Peris-Lopez - future generation computer …, 2019 - Elsevier
The use of the Internet of Things (IoT) in the electronic health (e-health) management
systems brings with it many challenges, including secure communications through insecure …

Slight: A lightweight authentication scheme for smart healthcare services

H Amintoosi, M Nikooghadam, M Shojafar… - Computers and …, 2022 - Elsevier
Critical infrastructures (CIs) include the vital resources for the country's economic and health
systems and should be kept secure. We face improvements in the Internet of Things which …

Decentralized authentication and access control protocol for blockchain-based e-health systems

X **ang, J Cao, W Fan - Journal of network and computer applications, 2022 - Elsevier
The Internet of things technology has accelerated the development of e-health solutions and
allows patients to obtain a more satisfying medical service experience. Each electronic …

A permissioned blockchain-based identity management and user authentication scheme for e-health systems

X **ang, M Wang, W Fan - IEEE access, 2020 - ieeexplore.ieee.org
The growth of electronic healthcare (e-health) systems is promoted by the evolution of
Internet of Things (IoT) technology, as this new environment provides a variety of …

Multi-factor user authentication scheme for IoT-based healthcare services

PK Dhillon, S Kalra - Journal of Reliable Intelligent Environments, 2018 - Springer
Due to the tremendous rise of the cloud computing and the Internet of Things (IoT)
paradigms, the possibility of remote monitoring of the patients in real time by a remote …

Design of a secure three-factor authentication scheme for smart healthcare

K Renuka, S Kumari, X Li - Journal of medical systems, 2019 - Springer
Now-a-days, the society is witnessing a keen urge to enhance the quality of healthcare
services with the intervention of technology in the health sector. The main focus in …

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems

Q Jiang, Z Chen, B Li, J Shen, L Yang, J Ma - Journal of Ambient …, 2018 - Springer
The deployment of telecare medical information system (TMIS) over public networks gives
rise to the threat of exposing sensitive medical information to illegal entities. Although a …