Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System

In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting attention. TMIS is one of the technologies used in Wireless Body Area Network (WBAN) and can provide patients with a variety of remote healthcare services. In TMIS environments, sensitive data of patients are...

Full description

Saved in:
Bibliographic Details
Published in:IEEE access Vol. 10; pp. 11511 - 11526
Main Authors: Ryu, Jongseok, Oh, Jihyeon, Kwon, Deokkyu, Son, Seunghwan, Lee, Joonyoung, Park, Yohan, Park, Youngho
Format: Journal Article
Language:English
Published: Piscataway IEEE 2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:2169-3536, 2169-3536
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting attention. TMIS is one of the technologies used in Wireless Body Area Network (WBAN) and can provide patients with a variety of remote healthcare services. In TMIS environments, sensitive data of patients are communicated via an open channel. An adversary may attempt various security attacks including impersonation, replay, and forgery attacks. Therefore, numberous authentication schemes have been suggested to provide secure communication for TMIS. Sahoo et al. proposed a mutual authentication scheme based on biometrics and Elliptic Curve Cryptography (ECC) in 2020. However, we find out that Sahoo et al. 's scheme cannot resist insider and privileged insider attacks and cannot guarantee patient anonymity. In this paper, we propose a secure ECC-based three-factor mutual authentication protocol that guarantees the privacy of patients for TMIS. We conduct informal security analysis to prove that our protocol is secure from various security attacks. In addition, we perform formal security analyses using the Automated Validation of Internet Security Protocols and Applications (AVISPA), Burrows-Abadi-Needham (BAN) logic, and the Real-Or-Random (ROR) model. Furthermore, we assess our protocol's performance and compare it to other protocols. As a result, our protocol has lower communication costs, and better security features compared to related existing protocols. Therefore, our protocol is more appropriate for TMIS environments than other related protocols.
AbstractList In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting attention. TMIS is one of the technologies used in Wireless Body Area Network (WBAN) and can provide patients with a variety of remote healthcare services. In TMIS environments, sensitive data of patients are communicated via an open channel. An adversary may attempt various security attacks including impersonation, replay, and forgery attacks. Therefore, numberous authentication schemes have been suggested to provide secure communication for TMIS. Sahoo et al. proposed a mutual authentication scheme based on biometrics and Elliptic Curve Cryptography (ECC) in 2020. However, we find out that Sahoo et al.’s scheme cannot resist insider and privileged insider attacks and cannot guarantee patient anonymity. In this paper, we propose a secure ECC-based three-factor mutual authentication protocol that guarantees the privacy of patients for TMIS. We conduct informal security analysis to prove that our protocol is secure from various security attacks. In addition, we perform formal security analyses using the Automated Validation of Internet Security Protocols and Applications (AVISPA), Burrows-Abadi-Needham (BAN) logic, and the Real-Or-Random (ROR) model. Furthermore, we assess our protocol’s performance and compare it to other protocols. As a result, our protocol has lower communication costs, and better security features compared to related existing protocols. Therefore, our protocol is more appropriate for TMIS environments than other related protocols.
Author Son, Seunghwan
Lee, Joonyoung
Oh, Jihyeon
Park, Yohan
Kwon, Deokkyu
Park, Youngho
Ryu, Jongseok
Author_xml – sequence: 1
  givenname: Jongseok
  orcidid: 0000-0002-6795-3442
  surname: Ryu
  fullname: Ryu, Jongseok
  organization: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea
– sequence: 2
  givenname: Jihyeon
  orcidid: 0000-0001-8690-2125
  surname: Oh
  fullname: Oh, Jihyeon
  organization: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea
– sequence: 3
  givenname: Deokkyu
  surname: Kwon
  fullname: Kwon, Deokkyu
  organization: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea
– sequence: 4
  givenname: Seunghwan
  orcidid: 0000-0002-3198-8467
  surname: Son
  fullname: Son, Seunghwan
  organization: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea
– sequence: 5
  givenname: Joonyoung
  orcidid: 0000-0002-8172-6182
  surname: Lee
  fullname: Lee, Joonyoung
  organization: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea
– sequence: 6
  givenname: Yohan
  orcidid: 0000-0002-9011-8410
  surname: Park
  fullname: Park, Yohan
  email: yhpark@kmu.ac.kr
  organization: School of Computer Engineering, Keimyung University, Daegu, South Korea
– sequence: 7
  givenname: Youngho
  orcidid: 0000-0002-0406-6547
  surname: Park
  fullname: Park, Youngho
  email: parkyh@knu.ac.kr
  organization: School of Electronic and Electrical Engineering, Kyungpook National University, Daegu, South Korea
BookMark eNqFkUtP3DAUhS1EJSjlF7CJxDrT-BE_ltNoaEcCUWmma8uPa8goE1PHWfDvMQShqhu8sXX0nXNtn6_odIwjIHSFmxXGjfq-7rrNbrciDSErilmrWnWCzgnmqqYt5af_nM_Q5TQdmrJkkVpxjvwO3Jyg2nRd_cNM4Kv9YwKob4zLMVV3c57NUK3n_Ahj7p3JfRyr3ynm6OJQhYLsYQBnSsQd-AIM1XYs8nEhd89ThuM39CWYYYLL9_0C_bnZ7Ltf9e39z223vq0da2SuaQM-YNJiTzxxDEtiscG89a1XjlErbcOIsYIF6qk1VFrBOXbCCcmVDYFeoO2S66M56KfUH0161tH0-k2I6UGbVF4xgJaBCwdUGUktMxCUp0AlWCqE4Mb7knW9ZD2l-HeGKetDnNNYrq8JJ0y0jApcKLpQLsVpShA-puJGv7ajl3b0azv6vZ3iUv-5XJ_fPiwn0w-feK8Wbw8AH9MUV43kkr4ANB6fnw
CODEN IAECCG
CitedBy_id crossref_primary_10_1016_j_cie_2022_108278
crossref_primary_10_1109_ACCESS_2022_3191414
crossref_primary_10_1007_s11277_023_10539_5
crossref_primary_10_1109_ACCESS_2022_3185016
crossref_primary_10_1109_ACCESS_2025_3586952
crossref_primary_10_1145_3638043
crossref_primary_10_3390_e27070765
crossref_primary_10_3390_electronics11244155
crossref_primary_10_1038_s41598_025_89502_2
crossref_primary_10_1109_ACCESS_2025_3545769
crossref_primary_10_3390_electronics12173688
crossref_primary_10_3390_su15075934
crossref_primary_10_1002_spy2_360
crossref_primary_10_1109_ACCESS_2023_3286016
crossref_primary_10_1016_j_csa_2023_100013
crossref_primary_10_1016_j_csa_2024_100035
crossref_primary_10_1109_ACCESS_2022_3168843
crossref_primary_10_3390_math11224653
crossref_primary_10_1002_cpe_70104
crossref_primary_10_1109_JSYST_2024_3519516
crossref_primary_10_3390_computers13090225
crossref_primary_10_1109_ACCESS_2024_3422038
crossref_primary_10_1007_s12083_023_01620_8
crossref_primary_10_1109_TVT_2024_3380392
crossref_primary_10_1016_j_iot_2024_101159
crossref_primary_10_1109_TII_2022_3202968
crossref_primary_10_3390_bdcc6040124
crossref_primary_10_1002_spy2_268
crossref_primary_10_3390_s22197433
crossref_primary_10_1007_s11042_025_20738_w
crossref_primary_10_1007_s11227_023_05749_4
crossref_primary_10_1007_s12083_024_01839_z
crossref_primary_10_1016_j_procs_2024_12_023
crossref_primary_10_1016_j_compeleceng_2023_108889
crossref_primary_10_1016_j_icte_2023_02_007
crossref_primary_10_3390_electronics11233845
crossref_primary_10_1002_spy2_428
crossref_primary_10_1007_s12083_023_01596_5
crossref_primary_10_1016_j_aej_2024_08_078
crossref_primary_10_1016_j_sysarc_2024_103143
crossref_primary_10_1109_ACCESS_2024_3437294
crossref_primary_10_1109_JIOT_2025_3586825
crossref_primary_10_1109_ACCESS_2022_3206457
crossref_primary_10_1002_cpe_7889
crossref_primary_10_1109_ACCESS_2022_3205001
crossref_primary_10_1016_j_heliyon_2024_e37577
crossref_primary_10_1109_ACCESS_2024_3458424
crossref_primary_10_1051_wujns_2023286531
crossref_primary_10_3390_jsan11030044
crossref_primary_10_1016_j_health_2023_100138
crossref_primary_10_1016_j_asej_2025_103605
crossref_primary_10_1109_ACCESS_2024_3373879
crossref_primary_10_1051_itmconf_20235201003
crossref_primary_10_1186_s13677_023_00464_0
crossref_primary_10_3390_s23042034
crossref_primary_10_3390_fi16050166
crossref_primary_10_3390_math10152548
crossref_primary_10_1007_s41870_023_01705_w
crossref_primary_10_1002_spy2_70005
crossref_primary_10_3390_electronics12061368
crossref_primary_10_1155_2022_1309402
crossref_primary_10_3390_math11010048
crossref_primary_10_1007_s12083_024_01719_6
crossref_primary_10_1016_j_compeleceng_2025_110367
crossref_primary_10_3390_fi16100357
crossref_primary_10_1007_s10586_023_04034_6
crossref_primary_10_1109_ACCESS_2022_3208347
Cites_doi 10.1007/3-540-46035-7_22
10.1007/3-540-48405-1_25
10.1007/s12652-020-02213-6
10.1145/77648.77649
10.1007/s12652-017-0516-2
10.1155/2021/6627956
10.3390/electronics10121417
10.1007/s10916-014-0145-7
10.1109/TNSE.2021.3093435
10.1186/s40064-016-2018-7
10.3390/s19102358
10.1109/JBHI.2018.2870319
10.1016/j.patcog.2004.04.011
10.5755/j01.itc.47.3.17361
10.1007/s10916-015-0233-3
10.1016/j.patcog.2006.05.030
10.1109/ACCESS.2020.3032680
10.1007/s10916-015-0262-y
10.1002/dac.3913
10.3390/su13169241
10.1007/s10916-015-0221-7
10.1109/TIT.1983.1056650
10.1007/s10916-013-9954-3
10.1007/s11277-020-07237-x
10.1016/j.cmpb.2016.07.028
10.1007/s11277-019-06897-8
10.3390/s21186039
10.1007/s11042-016-4208-2
10.3390/s21041488
10.1007/s11042-018-5683-4
10.3390/s21030936
10.1109/ACCESS.2021.3071499
10.1016/j.dcan.2021.07.002
10.1007/978-3-540-30580-4_6
10.1007/s10916-018-1120-5
10.1109/ACCESS.2020.3035076
10.1109/ACCESS.2019.2905731
10.2307/2007884
10.1109/ACCESS.2021.3111443
10.1016/j.scs.2021.103322
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
DOA
DOI 10.1109/ACCESS.2022.3145959
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Materials Research Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 11526
ExternalDocumentID oai_doaj_org_article_8f67ce39a83b4aef9d3e38eb37776add
10_1109_ACCESS_2022_3145959
9690868
Genre orig-research
GrantInformation_xml – fundername: Basic Science Research Program through the National Research Foundation of Korea (NRF)
  funderid: 10.13039/501100003725
– fundername: Ministry of Education
  grantid: 2021R1I1A3059551
  funderid: 10.13039/100010002
– fundername: Kyungpook National University Research Fund, in 2021
  funderid: 10.13039/501100002531
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c408t-30edf1251d2d2c4182b1a165d5d9c43b8b042ab74f3d3ba38b7661c7c7869bff3
IEDL.DBID DOA
ISICitedReferencesCount 66
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000750476500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2169-3536
IngestDate Tue Oct 14 19:09:33 EDT 2025
Sun Jun 29 15:25:40 EDT 2025
Sat Nov 29 06:31:53 EST 2025
Tue Nov 18 22:13:27 EST 2025
Wed Aug 27 03:00:18 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-30edf1251d2d2c4182b1a165d5d9c43b8b042ab74f3d3ba38b7661c7c7869bff3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-0406-6547
0000-0002-6795-3442
0000-0002-8172-6182
0000-0002-3198-8467
0000-0001-8690-2125
0000-0002-9011-8410
OpenAccessLink https://doaj.org/article/8f67ce39a83b4aef9d3e38eb37776add
PQID 2624754371
PQPubID 4845423
PageCount 16
ParticipantIDs ieee_primary_9690868
crossref_citationtrail_10_1109_ACCESS_2022_3145959
proquest_journals_2624754371
doaj_primary_oai_doaj_org_article_8f67ce39a83b4aef9d3e38eb37776add
crossref_primary_10_1109_ACCESS_2022_3145959
PublicationCentury 2000
PublicationDate 20220000
2022-00-00
20220101
2022-01-01
PublicationDateYYYYMMDD 2022-01-01
PublicationDate_xml – year: 2022
  text: 20220000
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref35
ref12
ref34
ref15
ref37
ref14
ref36
ref31
ref30
ref11
ref33
ref10
ref32
ref2
ref1
ref17
ref39
ref16
ref38
ref19
ref18
(ref8) 2021
ref24
ref23
ref26
ref25
ref20
ref42
ref41
ref22
ref21
ref28
ref27
(ref7) 2021
ref29
ref9
ref4
ref3
ref6
ref5
ref40
References_xml – ident: ref32
  doi: 10.1007/3-540-46035-7_22
– ident: ref29
  doi: 10.1007/3-540-48405-1_25
– ident: ref4
  doi: 10.1007/s12652-020-02213-6
– ident: ref5
  doi: 10.1145/77648.77649
– volume-title: Automated Validation of Internet Security Protocols and Applications
  year: 2021
  ident: ref7
– ident: ref18
  doi: 10.1007/s12652-017-0516-2
– ident: ref38
  doi: 10.1155/2021/6627956
– ident: ref40
  doi: 10.3390/electronics10121417
– ident: ref10
  doi: 10.1007/s10916-014-0145-7
– ident: ref36
  doi: 10.1109/TNSE.2021.3093435
– ident: ref14
  doi: 10.1186/s40064-016-2018-7
– volume-title: emphA Security Protocol Animator for AVISPA
  year: 2021
  ident: ref8
– ident: ref34
  doi: 10.3390/s19102358
– ident: ref23
  doi: 10.1109/JBHI.2018.2870319
– ident: ref25
  doi: 10.1016/j.patcog.2004.04.011
– ident: ref42
  doi: 10.5755/j01.itc.47.3.17361
– ident: ref13
  doi: 10.1007/s10916-015-0233-3
– ident: ref26
  doi: 10.1016/j.patcog.2006.05.030
– ident: ref1
  doi: 10.1109/ACCESS.2020.3032680
– ident: ref11
  doi: 10.1007/s10916-015-0262-y
– ident: ref20
  doi: 10.1002/dac.3913
– ident: ref33
  doi: 10.3390/su13169241
– ident: ref17
  doi: 10.1007/s10916-015-0221-7
– ident: ref27
  doi: 10.1109/TIT.1983.1056650
– ident: ref9
  doi: 10.1007/s10916-013-9954-3
– ident: ref35
  doi: 10.1007/s11277-020-07237-x
– ident: ref12
  doi: 10.1016/j.cmpb.2016.07.028
– ident: ref22
  doi: 10.1007/s11277-019-06897-8
– ident: ref28
  doi: 10.3390/s21186039
– ident: ref19
  doi: 10.1007/s11042-016-4208-2
– ident: ref30
  doi: 10.3390/s21041488
– ident: ref21
  doi: 10.1007/s11042-018-5683-4
– ident: ref39
  doi: 10.3390/s21030936
– ident: ref41
  doi: 10.1109/ACCESS.2021.3071499
– ident: ref3
  doi: 10.1016/j.dcan.2021.07.002
– ident: ref6
  doi: 10.1007/978-3-540-30580-4_6
– ident: ref15
  doi: 10.1007/s10916-018-1120-5
– ident: ref2
  doi: 10.1109/ACCESS.2020.3035076
– ident: ref16
  doi: 10.1109/ACCESS.2019.2905731
– ident: ref24
  doi: 10.2307/2007884
– ident: ref31
  doi: 10.1109/ACCESS.2021.3111443
– ident: ref37
  doi: 10.1016/j.scs.2021.103322
SSID ssj0000816957
Score 2.4863055
Snippet In the recent COVID-19 situation, Telecare Medical Information System (TMIS) is attracting attention. TMIS is one of the technologies used in Wireless Body...
SourceID doaj
proquest
crossref
ieee
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 11511
SubjectTerms Authentication
Authentication protocols
AVISPA
BAN logic
biohashing
Biometrics
Body area networks
Cryptography
Curves
Elliptic curve cryptography
Elliptic curves
Health services
Information systems
Open channels
Passwords
Protocols
ROR
Security
Security management
Servers
Telecare
Telecare medical information system
SummonAdditionalLinks – databaseName: IEEE Electronic Library (IEL)
  dbid: RIE
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1La9wwEB6S0EN76Cst3TQtOvQYN7YkW9IxMVl6aEMOW8hN6DGCQtktm93-_o5kxQRSCr0ZIwnZ34xGM9J8A_BJDMhNi7IJvWsb0kTR6JDaxueUHy4FSlco87-q62t9e2tuDuBszoVBxHL5DD_nx3KWHzdhn0Nl54ZcOT3oQzhUaphyteZ4Si4gYXpViYW61pxfjCN9A7mAnJNnKnuT-UgfGJ_C0V-LqjxaiYt5Wb74v4m9hOd1G8kuJtxfwQGuX8OzB-SCxxBLKB3Z1Tg2l2SrIlsRbtgsS4Ud9m2fM0dYDpHlC0NT5I7dbDe7DckGo70sW-UaOY6GqKc5rOYulZYT1fkb-L68Wo1fmlpToQmy1btGtBhT3tREHnmQ5F34znVDH_toghRee9Ji55VMIgrvhPaKLHhQQenB-JTEWzhab9b4DhjB2fHWqd4nLwMKL0LwfSb7NilhNyyA3_9sGyrheK578dMWx6M1dkLIZoRsRWgBZ3OnXxPfxr-bX2YU56aZLLu8IHhs1T2r06BofsZp4aXDZKJAodELRWJE6_sCjjOk8yAVzQWc3suErYp9Z_nApeqlUN3J33u9h6d5glOU5hSOdts9foAn4ffux932Y5HZP5E264c
  priority: 102
  providerName: IEEE
Title Secure ECC-Based Three-Factor Mutual Authentication Protocol for Telecare Medical Information System
URI https://ieeexplore.ieee.org/document/9690868
https://www.proquest.com/docview/2624754371
https://doaj.org/article/8f67ce39a83b4aef9d3e38eb37776add
Volume 10
WOSCitedRecordID wos000750476500001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: DOA
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: M~E
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NSxwxFA8iPeihWG3p-kUOHg1mkkw-jjrs0kMVDyt4C_mEQtkt6-qxf3tfMnFZEOzFyxyGTGbyPvPe5P0eQhdcJmZoEiT0jhLQRE50yJT4UvLDBE_CVcj8n-ruTj8-mvutVl_lTNgIDzwS7kpnqULixmnuhUvZRJ64hhBQKSVBOYv1pcpsBVPVButOml41mKGOmqvrYYAVQUDIGMSpojcFnXTLFVXE_tZi5Y1drs5mdoA-t10ivh6_7gvaSYtDtL-FHXiEYs2UJzwdBnIDrijiObAlkVltoINvn0thCC4ZsHIeaEzM4fvVcr0E1mPYquJ5aYHjYIr2swa30qQ6ckQy_4oeZtP58IO0lgkkCKrXhNMUc9mzRBZZEBA8-M51so99NEFwrz0oqfNKZB65d1x7BQ46qKC0ND5n_g3tLpaL9B1h4FbHqFO9z14ABzwPwfcFy9vknDo5QeyVejY0PPHS1uK3rXEFNXYkuS0kt43kE3S5eejPCKfx_vCbwpbN0IKFXW-AhNgmIfZ_EjJBR4Wpm0mMNBDH6Qk6fWWybXr7ZJlkQvWCq-74I159gvbKcsaUzSnaXa-e0xn6FF7Wv55W51Vk4Xr7d3peCw__ASSj8eU
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1La9wwEB7StND0kD7S0m2SVoce40bWw5KOicmS0s2SwxZyE3pCoOyWzW5-fyVZMYGWQm7GSEL2N6PRjDTfAHylXSAKB9Y4bnCTNJE20kXc2JzyQxgNzBTK_JmYz-XNjbregZMxFyaEUC6fhW_5sZzl-5Xb5lDZqUqunOzkM3jOGSN4yNYaIyq5hITiolILtVidnvV9-orkBBKSfFPGVWYkfWR-Ckt_Lavy11pcDMz09dOm9gb260YSnQ3Iv4WdsHwHrx7RCx6AL8H0gC76vjlP1sqjRUIuNNNSYwddbXPuCMpBsnxlaIjdoev1arNK0oHSbhYtcpUck4ao5zmoZi-VlgPZ-Xv4Ob1Y9JdNrarQOIblpqE4-Ji3NZ544ljyL2xr2o577pVj1Eqb9NhYwSL11BoqrUg23AknZKdsjPQD7C5Xy_ARUAK0JdgIbqNlLlBLnbM8032rGEPbTYA8_GztKuV4rnzxSxfXAys9IKQzQroiNIGTsdPvgXHj_83PM4pj00yXXV4keHTVPi1jJ9L8lJHUMhOi8jRQGSwVQnRphZ_AQYZ0HKSiOYGjB5nQVbXvNOkIE5xR0X76d68v8PJycTXTs-_zH4ewlyc7xGyOYHez3oZjeOHuN7d3689Ffv8A8dTuzg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+ECC-Based+Three-Factor+Mutual+Authentication+Protocol+for+Telecare+Medical+Information+System&rft.jtitle=IEEE+access&rft.au=Ryu%2C+Jongseok&rft.au=Oh%2C+Jihyeon&rft.au=Kwon%2C+Deokkyu&rft.au=Son%2C+Seunghwan&rft.date=2022&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=10&rft.spage=11511&rft.epage=11526&rft_id=info:doi/10.1109%2FACCESS.2022.3145959&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_ACCESS_2022_3145959
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon