[go: up one dir, main page]

Lu et al., 2015 - Google Patents

An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem

Lu et al., 2015

View HTML
Document ID
331321940753213535
Author
Lu Y
Li L
Peng H
Yang Y
Publication year
Publication venue
Journal of medical systems

External Links

Snippet

The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
Lu et al. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem
Sahoo et al. A secure three factor based authentication scheme for health care systems using IoT enabled devices
Ryu et al. Secure ECC-based three-factor mutual authentication protocol for telecare medical information system
Jiang et al. Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
Chaudhry et al. An enhanced lightweight anonymous biometric based authentication scheme for TMIS
Srinivas et al. A mutual authentication framework for wireless medical sensor networks
Amin et al. A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis
Jiang et al. A privacy preserving three-factor authentication protocol for e-health clouds
Mishra et al. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce
Das et al. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
Amin et al. An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography
Arshad et al. Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems
Jiang et al. A privacy enhanced authentication scheme for telecare medical information systems
Amin et al. A secure three-factor user authentication and key agreement protocol for tmis with user anonymity
Chaudhry et al. An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography
Debiao et al. A more secure authentication scheme for telecare medicine information systems
Xu et al. Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care
Wen et al. An improved anonymous authentication scheme for telecare medical information systems
Pippal et al. Robust smart card authentication scheme for multi-server architecture
Mishra et al. Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems
Cao et al. Improved dynamic id-based authentication scheme for telecare medical information systems
Li et al. A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems
Li et al. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
Aslam et al. A survey of authentication schemes in telecare medicine information systems
Irshad et al. A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme