Li et al., 2016 - Google Patents
A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systemsLi et al., 2016
- Document ID
- 12721130921212583920
- Author
- Li C
- Lee C
- Weng C
- Chen S
- Publication year
- Publication venue
- Journal of medical systems
External Links
Snippet
Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications …
- 230000000739 chaotic 0 title abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Li et al. | A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems | |
| Hathaliya et al. | Securing electronics healthcare records in healthcare 4.0: A biometric-based approach | |
| Ostad-Sharif et al. | A robust and efficient ECC-based mutual authentication and session key generation scheme for healthcare applications | |
| Jiang et al. | A privacy preserving three-factor authentication protocol for e-health clouds | |
| Renuka et al. | Design of a secure three-factor authentication scheme for smart healthcare | |
| Mishra et al. | A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems | |
| Jiang et al. | A privacy enhanced authentication scheme for telecare medical information systems | |
| Jiang et al. | Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems | |
| Amin et al. | A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis | |
| Srinivas et al. | A mutual authentication framework for wireless medical sensor networks | |
| Chaudhry et al. | An enhanced lightweight anonymous biometric based authentication scheme for TMIS | |
| Wu et al. | A secure authentication scheme for telecare medicine information systems | |
| Amin et al. | An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography | |
| Lu et al. | An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem | |
| Li et al. | A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems | |
| Mohit et al. | A standard mutual authentication protocol for cloud computing based health care system | |
| Arshad et al. | Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems | |
| Chiou et al. | Improvement of a privacy authentication scheme based on cloud for medical environment | |
| Aslam et al. | A survey of authentication schemes in telecare medicine information systems | |
| Irshad et al. | A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme | |
| Mir et al. | A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems | |
| Alzahrani | Secure and efficient cloud-based IoT authenticated key agreement scheme for e-health wireless sensor networks | |
| Suganthi et al. | End to end light weight mutual authentication scheme in IoT-based healthcare environment | |
| Chaudhry et al. | A multiserver biometric authentication scheme for tmis using elliptic curve cryptography | |
| Khan et al. | An improved user authentication protocol for healthcare services via wireless medical sensor networks |