메뉴 건너뛰기




Volumn 38, Issue 5, 2014, Pages

Secure verifier-based three-party authentication schemes without server public keys for data exchange in telecare medicine information systems

Author keywords

Authentication; Data exchange; Telecare medicine information system; Verifier based

Indexed keywords

ARTICLE; COMPUTER SECURITY; DATA PROCESSING; ELECTRONIC MEDICAL RECORD; INFORMATION STORAGE; MEDICAL INFORMATION SYSTEM; PERFORMANCE; TELECARE MEDICINE INFORMATION SYSTEM; WIRELESS COMMUNICATION; ACCESS TO INFORMATION; COMPUTER INTERFACE; CONFIDENTIALITY; HUMAN; ORGANIZATION AND MANAGEMENT; PATIENT IDENTIFICATION; TELEMEDICINE;

EID: 84897360924     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-014-0030-4     Document Type: Article
Times cited : (15)

References (22)
  • 1
    • 0033790614 scopus 로고    scopus 로고
    • Managing medical and insurance information through a smart-card-based information system
    • Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213-234, 2000.
    • (2000) J. Med. Syst. , vol.24 , Issue.4 , pp. 213-234
    • Lambrinoudakis, C.1    Gritzalis, S.2
  • 2
    • 84867843422 scopus 로고    scopus 로고
    • An efficient authentication scheme for telecare medicine information systems
    • Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833-3838, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3833-3838
    • Zhu, Z.1
  • 3
    • 84864061174 scopus 로고    scopus 로고
    • A secure authentication scheme for telecare medicine information systems
    • Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529-1535, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1529-1535
    • Wu, Z.Y.1    Lee, Y.C.2    Lai, F.3    Lee, H.C.4    Chung, Y.5
  • 4
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989-1995, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1989-1995
    • He, D.B.1    Chen, J.H.2    Zhang, R.3
  • 5
    • 84867869987 scopus 로고    scopus 로고
    • An improved authentication scheme for telecare medicine information systems
    • Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597-3604, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3597-3604
    • Wei, J.1    Hu, X.2    Liu, W.3
  • 6
    • 84874803351 scopus 로고    scopus 로고
    • A secure smart-card based authentication and key agreement scheme for telecare medicine information systems
    • Lee, T.-F., and Liu, C.-M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 37(3):9933, 2013. 1-8
    • (2013) J. Med. Syst. , vol.37 , Issue.3
    • Lee, T.-F.1    Liu, C.-M.2
  • 7
    • 84872265840 scopus 로고    scopus 로고
    • A chaotic map-based authentication scheme for telecare medicine information systems
    • Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaoticmap-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):9919, 2013. 1-7.
    • (2013) J. Med. Syst. , vol.37 , Issue.2
    • Hao, X.1    Wang, J.2    Yang, Q.3    Yan, X.4    Li, P.5
  • 8
    • 84875510914 scopus 로고    scopus 로고
    • A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system
    • Lee, T.-F., Chang, I.-P., Lin, T.-H., and Wang, C.-C., A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 37(3):9941, 2013. 1-7.
    • (2013) J. Med. Syst. , vol.37 , Issue.3
    • Lee, T.-F.1    Chang, I.-P.2    Lin, T.-H.3    Wang, C.-C.4
  • 9
    • 84891599579 scopus 로고    scopus 로고
    • An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems
    • Lee, T.-F., An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J. Med. Syst. 37(6):9985, 2013. 1-9.
    • (2013) J. Med. Syst. , vol.37 , Issue.6
    • Lee, T.-F.1
  • 10
    • 0345098454 scopus 로고    scopus 로고
    • Efficient three-party authentication and key agreement protocols resistant to password guessing attacks
    • Yeh, H.-T., Sun, H.-M., and Hwang, T., Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. Inf. Sci. Eng. 19(6):1059-1070, 2003.
    • (2003) Inf. Sci. Eng. , vol.19 , Issue.6 , pp. 1059-1070
    • Yeh, H.-T.1    Sun, H.-M.2    Hwang, T.3
  • 11
    • 25144525619 scopus 로고    scopus 로고
    • Efficient verifier-based key agreement protocol for three parties without server's public key
    • DOI 10.1016/j.amc.2004.06.129, PII S0096300304005454
    • Lee, S.-W., Kim, H.-S., and Yoo, K.-Y., Efficient verifier-based key agreement protocol for three partieswithout server 's public key. Appl. Math. Comput. 167(2):996-1003, 2005. (Pubitemid 41344804)
    • (2005) Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 996-1003
    • Lee, S.-W.1    Kim, H.-S.2    Yoo, K.-Y.3
  • 12
    • 67649791953 scopus 로고    scopus 로고
    • Communication-efficient three-party protocols for authentication and key agreement
    • Lee, T.-F., Liu, J. L., Sung, M.-J., Yang, S.-B., and Chen, C.-M., Communication-efficient three-party protocols for authentication and key agreement. Comput. Math. Appl. 58:641-648, 2009.
    • (2009) Comput. Math. Appl. , vol.58 , pp. 641-648
    • Lee, T.-F.1    Liu, J.L.2    Sung, M.-J.3    Yang, S.-B.4    Chen, C.-M.5
  • 13
    • 84899085062 scopus 로고    scopus 로고
    • Security enhancement on efficient verifier-based key agreement protocol for three parties without server's public key
    • Wang, R.-C., and Mo, K.-R., Security enhancement on efficient verifier-based key agreement protocol for three parties without server's public key. Int. Math. Forum 1(20):965-972, 2006.
    • (2006) Int. Math. Forum , vol.1 , Issue.20 , pp. 965-972
    • Wang, R.-C.1    Mo, K.-R.2
  • 14
    • 34248672528 scopus 로고    scopus 로고
    • Efficient verifier-based password-authenticated key exchange in the three-party setting
    • DOI 10.1016/j.csi.2006.12.002, PII S0920548906001395
    • Kwon, J.-O., Jeong, I.-R., Sakurai, K., and Lee, D.-H., Efficient verifier-based password-authenticated key exchange in the three-party setting. Comput. Stand. Interfaces 29(5): 513-520, 2007. (Pubitemid 46771127)
    • (2007) Computer Standards and Interfaces , vol.29 , Issue.5 , pp. 513-520
    • Kwon, J.O.1    Jeong, I.R.2    Sakurai, K.3    Lee, D.H.4
  • 15
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Diffie, W., and Hellman, M., New directions in cryptography. IEEE Trans. Inf. Theory 22(6):644-654, 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 16
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Proc. of Advances in Cryptology-Eurocrypt 2000
    • Bellare, M., Pointcheval, D., and Rogaway, P., Authenticated key exchange secure against dictionary attacks. Proc. of Advances in Cryptology-Eurocrypt 2000. Lect. Notes Comput. Sci 1807: 122-138, 2000.
    • (2000) Lect. Notes Comput. Sci , vol.1807 , pp. 122-138
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 17
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure password based authenticated key exchange protocols using Diffie-Hellman
    • Proc. of Advances in Cryptology-Eurocrypt 2000
    • Boyko, V., MacKenzie, P., and Patel, S., Provably secure password based authenticated key exchange protocols using Diffie-Hellman. Proc. of Advances in Cryptology-Eurocrypt 2000. Lect. Notes Comput. Sci 1807: 156-171, 2000.
    • (2000) Lect. Notes Comput. Sci , vol.1807 , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 18
    • 24144491593 scopus 로고    scopus 로고
    • Password-based authenticated key exchange in the three-party setting
    • Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
    • Abdalla, M., Fouque, P. A., and Pointcheval, D., Password-based authenticated key exchange in the three-party setting. Lect. Notes Comput. Sci 3386:65-84, 2005. (Pubitemid 41231326)
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 65-84
    • Abdalla, M.1    Fouque, P.-A.2    Pointcheval, D.3
  • 19
    • 24144443144 scopus 로고    scopus 로고
    • Simple password-based encrypted key exchange protocols
    • Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
    • Abdalla, M., and Pointcheval, D., Simple password-based authenticated key protocols. Topics in Cryptology-CT-RSA 2005. Lect. Notes Comput. Sci 3376:191-208, 2005. (Pubitemid 41231212)
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 191-208
    • Abdalla, M.1    Pointcheval, D.2
  • 22
    • 76349117227 scopus 로고    scopus 로고
    • Simple password-based three-party authenticated key exchange without server public keys
    • Lee, T.-F., and Hwang, T., Simple password-based three-party authenticated key exchange without server public keys. Inf. Sci. 180(9):1702-1714, 2010.
    • (2010) Inf. Sci. , vol.180 , Issue.9 , pp. 1702-1714
    • Lee, T.-F.1    Hwang, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.