Chen et al., 2021 - Google Patents
Privacy-aware smart card based biometric authentication scheme for e-healthChen et al., 2021
- Document ID
- 9043703839830055569
- Author
- Chen L
- Zhang K
- Publication year
- Publication venue
- Peer-to-Peer Networking and Applications
External Links
Snippet
Abstract Electronic health (E-health), which makes healthcare more convenient and flexible to practitioners, is envisioned to alleviate the contradiction between limited healthcare resources and growing healthcare requirements. However, it face various challenges, one of …
- 238000004458 analytical method 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hathaliya et al. | Securing electronics healthcare records in healthcare 4.0: A biometric-based approach | |
Jiang et al. | A privacy preserving three-factor authentication protocol for e-health clouds | |
Dhillon et al. | Multi-factor user authentication scheme for IoT-based healthcare services | |
Ostad-Sharif et al. | A robust and efficient ECC-based mutual authentication and session key generation scheme for healthcare applications | |
Chaudhry et al. | An enhanced lightweight anonymous biometric based authentication scheme for TMIS | |
Amin et al. | An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography | |
Mohit et al. | A standard mutual authentication protocol for cloud computing based health care system | |
Wang et al. | Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme | |
US10797879B2 (en) | Methods and systems to facilitate authentication of a user | |
Mishra et al. | Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce | |
Amin et al. | Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment | |
Chaudhry et al. | An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography | |
Amin et al. | Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems | |
Das et al. | A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care | |
Tan | A user anonymity preserving three-factor authentication scheme for telecare medicine information systems | |
Li et al. | A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems | |
Li et al. | Applying biometrics to design three‐factor remote user authentication scheme with key agreement | |
Praveen et al. | A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications | |
Chaudhry | A secure biometric based multi-server authentication scheme for social multimedia networks | |
WO2018110608A1 (en) | Collating system, method, device, and program | |
Praveen et al. | Improved Gentry–Halevi's fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things | |
Alzahrani | Secure and efficient cloud-based IoT authenticated key agreement scheme for e-health wireless sensor networks | |
Mishra | On the security flaws in id-based password authentication schemes for telecare medical information systems | |
Maitra et al. | An enhanced multi‐server authentication protocol using password and smart‐card: cryptanalysis and design | |
Wang et al. | A dual privacy-preservation scheme for cloud-based eHealth systems |