[1] B. Moazzami, N. Razavi-Khorasani, A. D. Moghadam, E. Farokhi, and N. Rezaei, “Covid-19 and telemedicine: Immediate action required for maintaining healthcare providers well-being,” J. Clin. Virol., vol. 126, 104345, 2020. https://doi.org/10.1016/j.jcv.2020.104345.
[2] J. Vidal-Alaball, R. Acosta-Roja, N. P. Hern´andez, U. S. Luque, D. Morrison, S. N. P´erez, J. Perez-Llano, A. S. V`erges, and F. L. Seguí, “Telemedicine in the face of the covid-19 pandemic,” Aten. Prim., vol. 52, no. 6, pp. 418-422, 2020. https://doi.org/10.1016/j.aprim.2020.04.003.
[3] V. Chauhan, S. Galwankar, B. Arquilla, M. Garg, S. Di Somma, A. El-Menyar, V. Krishnan, J. Gerber, R. Holland, and S. P. Stawicki, “Novel coronavirus (covid-19): Leveraging telemedicine to optimize care while minimizing exposures and viral transmission,” J. Emerg. Trauma Shock, vol. 13, no. 1, pp. 20-24, 2020. https://doi.org/10.4103/JETS.JETS_32_20.
[4] M. Shariq, and K. Singh, “A novel vector-space-based lightweight privacy-preserving RFID authentication protocol for IoT environment,” J. Supercomput., vol. 77, no. 8, pp. 8532-8562, 2021. https://doi.org/10.1007/s11227-020-03550-1.
[5] M. Shariq, K. Singh, M. Y. Bajuri, A. A. Pantelous, A. Ahmadian, and M. Salimi, “A secure and reliable RFID authentication protocol using digital schnorr cryptosystem for IoT-enabled healthcare in COVID-19 scenario,” Sustain. Cities Soc., vol. 75, 103354, 2021. https://doi.org/10.1016/j.scs.2021.103354.
[6] D. Dharminder, D. Mishra, and X. Li, “Construction of RSA-based authentication scheme in authorized access to healthcare services,” J. Med. Syst., vol. 44, no. 1, pp. 1-9, 2020. https://doi.org/10.1007/s10916-019-1471-6.
[7] S. D. Kaul, and A. K. Awasthi, “RFID authentication protocol to enhance patient medication safety,” J. Med. Syst., vol. 37, no. 6, pp. 1-6, 2013. https://doi.org/10.1007/s10916-013-9979-7.
[8] J.-S. Chou, “An efficient mutual authentication RFID scheme based on elliptic curve cryptography,” J. Supercomput., vol. 70, no. 1, pp. 75-94, 2014. https://doi.org/10.1007/s11227-013-1073-x.
[9] Z. Zhang, and Q. Qi, “An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography,” J. Med. Syst., vol. 38 no. 5, pp. 1-7, 2014. https://doi.org/10.1007/s10916-014-0047-8.
[10] Y.-P. Liao, and C.-M. Hsiao, “A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol,” Ad Hoc Netw., vol. 18, pp. 133-146, 2014. https://doi.org/10.1016/j.adhoc.2013.02.004.
[11] Z. Zhao, “A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem,” J. Med. Syst., vol. 38, no. 5, pp. 1-7, 2014. https://doi.org/10.1007/s10916-014-0046-9.
[12] M. S. Farash, O. Nawaz, K. Mahmood, S. A. Chaudhry, and M. K. Khan, “A provably secure RFID authentication protocol based on elliptic curve for healthcare environments,” J. Med. Syst., vol. 40, no. 7, pp. 1-7, 2016. https://doi.org/10.1007/s10916-016-0521-6.
[13] K. Srivastava, A. K. Awasthi, S. D. Kaul, and R. Mittal, “A hash based mutual RFID tag authentication protocol in telecare medicine information system,” J. Med. Syst., vol. 39, no. 1, pp. 1-5, 2015. https://doi.org/10.1007/s10916-014-0153-7.
[14] C.-T. Li, C.-Y. Weng, and C.-C. Lee, “A secure RFID tag authentication protocol with privacy preserving in telecare medicine information system,” J. Med. Syst., vol. 39, no. 8, pp. 1-8, 2015. https://doi.org/10.1007/s10916-015-0260-0.
[15] C. Jin, C. Xu, X. Zhang, and F. Li, “A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety,” J. Med. Syst., vol. 40, no. 1, pp. 1-6, 2016. https://doi.org/10.1007%2Fs10916-015-0362-8.
[16] J. prakash Pokala, M. C. Reddy, S. Bapana, and C. S. Vorugunti, “A secure RFID protocol for telecare medicine information systems using ECC,” 2016 international conference on wireless communications, signal processing and networking (WISPNET), pp. 2295-2300, 2016. https://doi.org/10.1109/WiSPNET.2016.7566552.
[17] Z. Zhou, P. Wang, and Z. Li, “A quadratic residue-based RFID authentication protocol with enhanced security for TMIS,” J. Amb. Intel. Hum. Comp., vol. 10, no. 9, pp. 3603-3615, 2019. https://doi.org/:10.1007/s12652-018-1088-5.
[18] T. Afroz, M. N. U. Bhuiyan, and M. N. Uddin, “A secure mutual authentication protocol for IoT using ID verifier based on ECC,” 2019 international conference on sustainable technologies for industry 4.0 (STI), pp. 1-6, 2019. https://doi.org/10.1109/STI47673.2019.9068089.
[19] H. Shen, J. Shen, M. K. Khan, and J.-H. Lee, “Efficient RFID authentication using elliptic curve cryptography for the internet of things,” Wireless Pers. Commun., vol. 96, no. 4, pp. 5253-5266, 2017. https://doi.org/10.1007/s11277-016-3739-1.
[20] F. Xiao, Y. Zhou, J. Zhou, H. Zhu, and X. Niu, “Security Protocol for RFID System Conforming to EPC-C1G2 Standard,” J. Computers, vol. 8, no. 3, pp. 605-612, 2013.
[23] A. A. Alamr, F. Kausar, J. Kim, and C. Seo, “A secure ECC-based RFID mutual authentication protocol for internet of things,” J. Supercomput., vol. 74, no. 9, pp. 4281-4294, 2018. https://doi.org/10.1007/s11227-016-1861-1.
[24] Y.-J. Tu, G. Kapoor, and S. Piramuthu, “Security of lightweight mutual authentication protocols,” J. Supercomput., vol. 77, no. 5, pp. 4565-4581, 2020. https://doi.org/10.1007/s11227-020-03448-y.
[25] D. Noori, H. Shakeri, and M. N. Torshiz, “Scalable, efficient, and secure RFID with elliptic curve cryptosystem for internet of things in healthcare environment,” EURASIP J. Inform. Sec., vol. 20, no. 1, pp. 1-11, 2020. https://doi.org/10.1186/s13635-020-00114-x.
[26] F. M. Salem, and R. Amin, “A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS,” Inform. Sciences, vol. 527, pp. 382-393, 2020. https://doi.org/10.1016/j.ins.2019.07.029.
[27] X. Chen, D. Geng, J. Zhai, W. Liu, H. Zhang, and T. Zhu, “Security analysis and enhancement of the most recent RFID protocol for telecare medicine information system,” Wireless Pers. Commun., vol. 114, no. 2, pp. 1371-1387, 2020. https://doi.org/10.1007/s11277-017-4474-y.
[28] K. Fan, W. Jiang, H. Li, and Y. Yang, “Lightweight RFID protocol for medical privacy protection in IoT,” IEEE T. Ind. Inform., vol. 14, no. 4, pp. 1656-1665, 2018. https://doi.org/10.1109/TII.2018.2794996.
[29] M. Benssalah, M. Djeddou, and K. Drouiche, “Security analysis and enhancement of the most recent RFID authentication protocol for telecare medicine information system,” Wireless Pers. Commun., vol. 96, no. 4, pp. 6221-6238, 2017. https://doi.org/10.1007/s11277-017-4474-y.
[30] M. Shariq, and K. Singh, “A novel vector-space-based lightweight privacy preserving RFID authentication protocol for IoT environment,” J. Supercomput., vol. 77, no. 8, pp. 8532-8562, 2021. https://doi.org/10.1007/s11227-020-03550-1.
[31] L. Xiao, S. Xie, D. Han, W. Liang, J. Guo, and W.-K. Chou, “A lightweight authentication scheme for telecare medical information system,” Connect. Sci., vol. 33, no. 3, pp. 769-785, 2021. https://doi.org/10.1080/09540091.2021.1889976.
[32] W. R. Liu, Z. Y. Ji, and C. C. Chu, “An Improved Secure RFID Authentication Protocol Using Elliptic Curve Cryptography,” Int. J. Netw. Sec., vol. 26, no. 1, pp. 106-115, 2024. https://doi.org/10.6633/IJNS.202401_26(1).14.