{"id":"https://openalex.org/W2916451158","doi":"https://doi.org/10.1155/2019/3263902","title":"RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications","display_name":"RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications","publication_year":2019,"publication_date":"2019-03-17","ids":{"openalex":"https://openalex.org/W2916451158","doi":"https://doi.org/10.1155/2019/3263902","mag":"2916451158"},"language":"en","primary_location":{"id":"doi:10.1155/2019/3263902","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/3263902","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/3263902.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2019/3263902.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040624046","display_name":"Mishall Al-Zubaidie","orcid":"https://orcid.org/0000-0002-3149-9129"},"institutions":[{"id":"https://openalex.org/I202735123","display_name":"Thi Qar University","ror":"https://ror.org/02ypa8k59","country_code":"IQ","type":"education","lineage":["https://openalex.org/I202735123"]},{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU","IQ"],"is_corresponding":true,"raw_author_name":"Mishall Al-Zubaidie","raw_affiliation_strings":["Faculty of Health, Engineering and Sciences, University of Southern Queensland, Toowoomba, QLD 4350, Australia","Thi-Qar University, Nasiriyah 64001, Iraq"],"affiliations":[{"raw_affiliation_string":"Faculty of Health, Engineering and Sciences, University of Southern Queensland, Toowoomba, QLD 4350, Australia","institution_ids":["https://openalex.org/I185523456"]},{"raw_affiliation_string":"Thi-Qar University, Nasiriyah 64001, Iraq","institution_ids":["https://openalex.org/I202735123"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100452419","display_name":"Zhongwei Zhang","orcid":"https://orcid.org/0000-0001-6622-0346"},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Zhongwei Zhang","raw_affiliation_strings":["Faculty of Health, Engineering and Sciences, University of Southern Queensland, Toowoomba, QLD 4350, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Health, Engineering and Sciences, University of Southern Queensland, Toowoomba, QLD 4350, Australia","institution_ids":["https://openalex.org/I185523456"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100684093","display_name":"Ji Zhang","orcid":"https://orcid.org/0000-0002-2718-6509"},"institutions":[{"id":"https://openalex.org/I185523456","display_name":"University of Southern Queensland","ror":"https://ror.org/04sjbnx57","country_code":"AU","type":"education","lineage":["https://openalex.org/I185523456"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ji Zhang","raw_affiliation_strings":["Faculty of Health, Engineering and Sciences, University of Southern Queensland, Toowoomba, QLD 4350, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Health, Engineering and Sciences, University of Southern Queensland, Toowoomba, QLD 4350, Australia","institution_ids":["https://openalex.org/I185523456"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040624046"],"corresponding_institution_ids":["https://openalex.org/I185523456","https://openalex.org/I202735123"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":3.7136,"has_fulltext":true,"cited_by_count":45,"citation_normalized_percentile":{"value":0.93734445,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"26"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9684000015258789,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8135918378829956},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7836484909057617},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.6575570702552795},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5846331715583801},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5315808057785034},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4429600238800049},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4274861216545105},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39601731300354004}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8135918378829956},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7836484909057617},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.6575570702552795},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5846331715583801},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5315808057785034},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4429600238800049},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4274861216545105},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39601731300354004}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2019/3263902","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/3263902","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/3263902.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:eprints.usq.edu.au:36210","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400692","display_name":"University of Southern Queensland ePrints (University of Southern Queensland)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I185523456","host_organization_name":"University of Southern Queensland","host_organization_lineage":["https://openalex.org/I185523456"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article (Commonwealth Reporting Category C)"},{"id":"pmh:oai:doaj.org/article:0ab55538b9394715abc2ba0bf4095026","is_oa":true,"landing_page_url":"https://doaj.org/article/0ab55538b9394715abc2ba0bf4095026","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2019 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2019/3263902","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/3263902","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/3263902.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2916451158.pdf","grobid_xml":"https://content.openalex.org/works/W2916451158.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W35428663","https://openalex.org/W147018390","https://openalex.org/W652514868","https://openalex.org/W2002110658","https://openalex.org/W2029693536","https://openalex.org/W2043585968","https://openalex.org/W2064286906","https://openalex.org/W2066571890","https://openalex.org/W2090073504","https://openalex.org/W2096025074","https://openalex.org/W2118982061","https://openalex.org/W2152979814","https://openalex.org/W2199936853","https://openalex.org/W2279777762","https://openalex.org/W2281830773","https://openalex.org/W2317848211","https://openalex.org/W2324704545","https://openalex.org/W2344173564","https://openalex.org/W2396934461","https://openalex.org/W2412908136","https://openalex.org/W2519361213","https://openalex.org/W2521899819","https://openalex.org/W2524195644","https://openalex.org/W2546074126","https://openalex.org/W2548111050","https://openalex.org/W2552699189","https://openalex.org/W2560053843","https://openalex.org/W2560195950","https://openalex.org/W2562086057","https://openalex.org/W2579964673","https://openalex.org/W2594748672","https://openalex.org/W2618218927","https://openalex.org/W2768229290","https://openalex.org/W2783774416","https://openalex.org/W2794918741","https://openalex.org/W2963562852","https://openalex.org/W3192788009"],"related_works":["https://openalex.org/W143386018","https://openalex.org/W2656445685","https://openalex.org/W3046827176","https://openalex.org/W4315694784","https://openalex.org/W2410215724","https://openalex.org/W2146652056","https://openalex.org/W2986700784","https://openalex.org/W2517088709","https://openalex.org/W53870421","https://openalex.org/W2953410103"],"abstract_inverted_index":{"Providing":[0],"a":[1,118,140,215,222],"mechanism":[2],"to":[3,14,35,39,47,81,169,187],"authenticate":[4,188],"users":[5,44,73,122],"in":[6,220],"healthcare":[7],"applications":[8,207],"is":[9],"an":[10,90,160],"essential":[11],"security":[12,172,196,204,219],"requirement":[13],"prevent":[15],"both":[16,128],"external":[17],"and":[18,25,70,74,114,131,155,167,173,183,194,206],"internal":[19],"attackers":[20],"from":[21,54,99],"penetrating":[22],"patients\u2019":[23,60,112],"identities":[24],"revealing":[26],"their":[27],"health":[28,76],"data.":[29],"Many":[30],"schemes":[31,51],"have":[32,97],"been":[33],"developed":[34],"provide":[36],"authentication":[37,105,151],"mechanisms":[38,96,186],"ensure":[40,108],"that":[41,120,148,211],"only":[42],"legitimate":[43,133,189],"are":[45],"authorised":[46],"connect,":[48],"but":[49],"these":[50],"still":[52],"suffer":[53],"vulnerable":[55],"security.":[56],"Various":[57],"attacks":[58],"expose":[59],"data":[61,69],"for":[62,144],"malicious":[63],"tampering":[64],"or":[65],"destruction.":[66],"Transferring":[67],"health-related":[68],"information":[71,113,126],"between":[72,152],"the":[75,100,109,125,129,132,153,199],"centre":[77],"makes":[78],"them":[79],"exposed":[80],"penetration":[82],"by":[83],"adversaries":[84],"as":[85],"they":[86],"may":[87],"move":[88],"through":[89],"insecure":[91],"channel.":[92],"In":[93,135],"addition,":[94],"previous":[95],"suffered":[98],"poor":[101],"protection":[102,110],"of":[103,111,127,202,218,225],"users\u2019":[104],"information.":[106],"To":[107],"data,":[115],"we":[116,138],"propose":[117,139],"scheme":[119],"authenticates":[121],"based":[123],"on":[124,179],"device":[130],"user.":[134],"this":[136],"paper,":[137],"Robust":[141],"Authentication":[142],"Model":[143],"Healthcare":[145],"Users":[146],"(RAMHU)":[147],"provides":[149],"mutual":[150],"server":[154],"clients.":[156],"This":[157],"model":[158,213],"utilizes":[159],"Elliptic":[161],"Curve":[162],"Integrated":[163],"Encryption":[164],"Scheme":[165],"(ECIES)":[166],"PHOTON":[168],"achieve":[170],"strong":[171],"good":[174],"overall":[175],"performance.":[176],"RAMHU":[177],"relies":[178],"multiple-pseudonym,":[180],"physical":[181],"address,":[182],"one-time":[184],"password":[185],"users.":[190],"Moreover,":[191],"extensive":[192],"informal":[193],"formal":[195],"analysis":[197],"with":[198],"automated":[200],"validation":[201],"Internet":[203],"protocols":[205],"(AVISPA)":[208],"tool":[209],"demonstrate":[210],"our":[212],"offers":[214],"high":[216],"level":[217],"repelling":[221],"wide":[223],"variety":[224],"possible":[226],"attacks.":[227]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
