Nothing Special   »   [go: up one dir, main page]

Chen et al., 2012 - Google Patents

An efficient and secure dynamic id-based authentication scheme for telecare medical information systems

Chen et al., 2012

Document ID
10782822757640546726
Author
Chen H
Lo J
Yeh C
Publication year
Publication venue
Journal of medical systems

External Links

Snippet

The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Similar Documents

Publication Publication Date Title
Chen et al. An efficient and secure dynamic id-based authentication scheme for telecare medical information systems
Aghili et al. LACO: Lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT
Sahoo et al. A secure three factor based authentication scheme for health care systems using IoT enabled devices
Jiang et al. A privacy preserving three-factor authentication protocol for e-health clouds
Ostad-Sharif et al. A robust and efficient ECC-based mutual authentication and session key generation scheme for healthcare applications
Mohit et al. A standard mutual authentication protocol for cloud computing based health care system
Amin et al. A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis
Alizadeh et al. Authentication in mobile cloud computing: A survey
Li et al. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
Mir et al. A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services
Al-Zubaidie et al. RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications
Das et al. A secure and robust user authenticated key agreement scheme for hierarchical multi-medical server environment in TMIS
Khan et al. An improved user authentication protocol for healthcare services via wireless medical sensor networks
Masud et al. A user-centric privacy-preserving authentication protocol for IoT-AmI environments
Kim et al. On the security of two remote user authentication schemes for telecare medical information systems
Adeli et al. On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments
Gaikwad et al. Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function
Li et al. Secure privacy-preserving biometric authentication scheme for telecare medicine information systems
Singh et al. TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor
Wen A more secure anonymous user authentication scheme for the integrated EPR information system
Wu et al. A Provably Secure Authentication and Key Agreement Protocol in Cloud‐Based Smart Healthcare Environments
Das A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system
Chen et al. Attacks and Solutions for a Two‐Factor Authentication Protocol for Wireless Body Area Networks
Fakroon et al. Multifactor authentication scheme using physically unclonable functions
Hamed et al. Secure Patient Authentication Scheme in the Healthcare System Using Symmetric Encryption.