Nothing Special   »   [go: up one dir, main page]

Chen et al., 2021 - Google Patents

Privacy-aware smart card based biometric authentication scheme for e-health

Chen et al., 2021

Document ID
9043703839830055569
Author
Chen L
Zhang K
Publication year
Publication venue
Peer-to-Peer Networking and Applications

External Links

Snippet

Abstract Electronic health (E-health), which makes healthcare more convenient and flexible to practitioners, is envisioned to alleviate the contradiction between limited healthcare resources and growing healthcare requirements. However, it face various challenges, one of …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Similar Documents

Publication Publication Date Title
Hathaliya et al. Securing electronics healthcare records in healthcare 4.0: A biometric-based approach
Jiang et al. A privacy preserving three-factor authentication protocol for e-health clouds
Dhillon et al. Multi-factor user authentication scheme for IoT-based healthcare services
Ostad-Sharif et al. A robust and efficient ECC-based mutual authentication and session key generation scheme for healthcare applications
Chaudhry et al. An enhanced lightweight anonymous biometric based authentication scheme for TMIS
Amin et al. An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography
Mohit et al. A standard mutual authentication protocol for cloud computing based health care system
Wang et al. Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme
US10797879B2 (en) Methods and systems to facilitate authentication of a user
Mishra et al. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce
Amin et al. Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment
Chaudhry et al. An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography
Amin et al. Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems
Das et al. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
Tan A user anonymity preserving three-factor authentication scheme for telecare medicine information systems
Li et al. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
Li et al. Applying biometrics to design three‐factor remote user authentication scheme with key agreement
Praveen et al. A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications
Chaudhry A secure biometric based multi-server authentication scheme for social multimedia networks
WO2018110608A1 (en) Collating system, method, device, and program
Praveen et al. Improved Gentry–Halevi's fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things
Alzahrani Secure and efficient cloud-based IoT authenticated key agreement scheme for e-health wireless sensor networks
Mishra On the security flaws in id-based password authentication schemes for telecare medical information systems
Maitra et al. An enhanced multi‐server authentication protocol using password and smart‐card: cryptanalysis and design
Wang et al. A dual privacy-preservation scheme for cloud-based eHealth systems