메뉴 건너뛰기




Volumn 36, Issue 6, 2012, Pages 3833-3838

An efficient authentication scheme for telecare medicine information systems

Author keywords

Mobile device; Mutual authentication; Password; Telecare medicine information system

Indexed keywords

COMPUTER SECURITY; CONFERENCE PAPER; DATA ANALYSIS SOFTWARE; ELECTRONIC MEDICAL RECORD; INFORMATION TECHNOLOGY; MASS COMMUNICATION; MEDICAL INFORMATION SYSTEM; PATIENT INFORMATION; PRIVACY; TELEMEDICINE;

EID: 84867843422     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-012-9856-9     Document Type: Conference Paper
Times cited : (164)

References (18)
  • 1
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • 464646 10.1145/358790.358797
    • Lamport, L.; Password Authentication with Insecure Communication. Comm. ACM 24(11):770-772, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 3
    • 33748125161 scopus 로고    scopus 로고
    • A secure identification and key agreement protocol with user anonymity (SIKA)
    • 10.1016/j.cose.2006.05.002
    • Mangipudi, K.; Katti, R.; A secure identification and key agreement protocol with user anonymity (SIKA). Comput. Secur, 25(6):420-425, 2006.
    • (2006) Computers & Security , vol.25 , Issue.6 , pp. 420-425
    • Mangipudi, K.1    Katti, R.2
  • 4
    • 36349005859 scopus 로고    scopus 로고
    • Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
    • 1130.68050 10.1016/j.compeleceng.2006.11.005
    • Lee, N.-Y.; Wu, C.-N.; Wang, C.-C.; Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings. Comput. Electr. Eng. 34(1):12-20, 2008.
    • (2008) Computers & Electrical Engineering , vol.34 , Issue.1 , pp. 12-20
    • Lee, N.-Y.1    Wu, C.-N.2    Wang, C.-C.3
  • 5
    • 63049116480 scopus 로고    scopus 로고
    • An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    • 10.1016/j.cose.2008.11.008
    • Yang, J.-H.; Chang, C.-C.; An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28:138-143, 2009.
    • (2009) Computers and Security , vol.28 , pp. 138-143
    • Yang, J.-H.1    Chang, C.-C.2
  • 6
    • 79952538982 scopus 로고    scopus 로고
    • Provably secure and efficient identification and key agreement protocol with user anonymity
    • doi: 10.1016/j.jcss.2010.07.004
    • Wang, R.-C.; Juang, W.-S.; Lei, C.-L.; Provably secure and efficient identification and key agreement protocol with user anonymity. J. Comput. Syst. Sci. doi: 10.1016/j.jcss.2010.07.004, 2010.
    • (2010) J. Comput. Syst. Sci.
    • Wang, R.-C.1    Juang, W.-S.2    Lei, C.-L.3
  • 7
    • 80052614336 scopus 로고    scopus 로고
    • An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
    • doi: 10.1016/j.infus.2011.01.001
    • He, D.; Chen, J.; Hu, J.; An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inform. Fusion. doi: 10.1016/j.infus.2011.01.001, 2011.
    • (2011) Inform. Fusion.
    • He, D.1    Chen, J.2    Hu, J.3
  • 8
    • 84863985527 scopus 로고    scopus 로고
    • A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    • doi: 10.1002/sec.506 2011
    • He, D.; Chen, J.; Chen, Y.; A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur. Comm. Network. doi: 10.1002/sec.506, 2011.
    • Secur. Comm. Network.
    • He, D.1    Chen, J.2    Chen, Y.3
  • 9
    • 84859767453 scopus 로고    scopus 로고
    • An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings
    • doi: 10.1016/j.adhoc.2012.01.002
    • He, D.; An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings, Ad Hoc Networks. doi: 10.1016/j.adhoc.2012.01.002, 2012.
    • (2012) Ad Hoc Networks
    • He, D.1
  • 10
    • 84863989374 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
    • doi: 10.1007/s11071-012-0335-0
    • He, D.; Chen, Y.; Chen, J.; Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol, Nonlinear Dynam. doi: 10.1007/s11071-012-0335-0, 2012.
    • (2012) Nonlinear Dynam.
    • He, D.1    Chen, Y.2    Chen, J.3
  • 11
    • 84864061174 scopus 로고    scopus 로고
    • A secure authentication scheme for telecare medicine information systems
    • doi: 10.1007/s10916-010-9614-9
    • Wu, Z. Y.; Lee, Y. C.; Lai, F.; Lee H. C.; and Chung, Y.; A secure authentication scheme for telecare medicine information systems. J. Med. Syst. doi: 10.1007/s10916-010-9614-9, 2010.
    • (2010) J. Med. Syst.
    • Wu, Z.Y.1    Lee, Y.C.2    Lai, F.3    Lee, H.C.4    Chung, Y.5
  • 12
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • doi: 10.1007/s10916-011-9658-5
    • He, D. B.; Chen, J. H.; and Zhang, R.; A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. doi: 10.1007/s10916-011-9658-5, 2011.
    • (2011) J. Med. Syst.
    • He, D.B.1    Chen, J.H.2    Zhang, R.3
  • 13
    • 84867869987 scopus 로고    scopus 로고
    • An Improved Authentication Scheme for Telecare Medicine Information Systems
    • doi: 10.1007/s10916-012-9835-1
    • Wei, J.; Hu, X.; Liu, W.; An Improved Authentication Scheme for Telecare Medicine Information Systems, J. Med. Syst. doi: 10.1007/s10916-012-9835-1, 2012.
    • (2012) J. Med. Syst.
    • Wei, J.1    Hu, X.2    Liu, W.3
  • 15
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • 1901004 10.1109/TC.2002.1004593
    • Messerges T.; Dabbish E.; Sloan R.; Examining smart-card security under the threat of power analysis attacks, IEEE Trans. Comput. 51(5):541-552, 2002.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.1    Dabbish, E.2    Sloan, R.3
  • 16
    • 84873982441 scopus 로고    scopus 로고
    • PKCS, Public key cryptography standards, PKCS #1 v2.1
    • PKCS, Public key cryptography standards, PKCS #1 v2.1, RSA Cryptography Standard, Draft 2, 2001. Available at http://www.rsasecurity.com/rsalabs/pkcs/
    • (2001) RSA Cryptography Standard, Draft 2
  • 18
    • 84873981630 scopus 로고    scopus 로고
    • Wikipedia, RSA (algorithm)
    • Wikipedia, RSA (algorithm). Available at http://en.wikipedia.org/wiki/ RSA-(algorithm)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.