Lu et al., 2015 - Google Patents
An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystemLu et al., 2015
View HTML- Document ID
- 331321940753213535
- Author
- Lu Y
- Li L
- Peng H
- Yang Y
- Publication year
- Publication venue
- Journal of medical systems
External Links
Snippet
The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to …
- 239000003814 drug 0 title description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lu et al. | An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem | |
| Sahoo et al. | A secure three factor based authentication scheme for health care systems using IoT enabled devices | |
| Ryu et al. | Secure ECC-based three-factor mutual authentication protocol for telecare medical information system | |
| Jiang et al. | Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems | |
| Chaudhry et al. | An enhanced lightweight anonymous biometric based authentication scheme for TMIS | |
| Srinivas et al. | A mutual authentication framework for wireless medical sensor networks | |
| Amin et al. | A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis | |
| Jiang et al. | A privacy preserving three-factor authentication protocol for e-health clouds | |
| Mishra et al. | Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce | |
| Das et al. | A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care | |
| Amin et al. | An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography | |
| Arshad et al. | Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems | |
| Jiang et al. | A privacy enhanced authentication scheme for telecare medical information systems | |
| Amin et al. | A secure three-factor user authentication and key agreement protocol for tmis with user anonymity | |
| Chaudhry et al. | An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography | |
| Debiao et al. | A more secure authentication scheme for telecare medicine information systems | |
| Xu et al. | Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care | |
| Wen et al. | An improved anonymous authentication scheme for telecare medical information systems | |
| Pippal et al. | Robust smart card authentication scheme for multi-server architecture | |
| Mishra et al. | Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems | |
| Cao et al. | Improved dynamic id-based authentication scheme for telecare medical information systems | |
| Li et al. | A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems | |
| Li et al. | A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems | |
| Aslam et al. | A survey of authentication schemes in telecare medicine information systems | |
| Irshad et al. | A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme |