Research Article
New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT
| Begin | (14) | Intercept the transmitted values | (15) | Call reveal oracle on for getting value of as ←reveal1 | (16) | Call reveal oracle on for getting value of as← reveal1 | (17) | Calculate | (18) | Generate the session key | (19) | Compute | (20) | If (), then | | Accept as effective user’s session key. | | Return (true) | (21) | Else | | Return (false) | (22) | End if | | End. |
|