메뉴 건너뛰기




Volumn 2014, Issue , 2014, Pages

An improved user authentication protocol for healthcare services via wireless medical sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

HEALTH CARE; PHYSIOLOGY; SENSOR NODES; SMART CARDS;

EID: 84901008838     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2014/347169     Document Type: Article
Times cited : (44)

References (25)
  • 1
    • 59649083248 scopus 로고    scopus 로고
    • A more efficient and secure dynamic ID-based remote user authentication scheme
    • 2-s2.0-59649083248 10.1016/j.comcom.2008.11.008
    • Wang Y.-Y., Liu J.-Y., Xiao F.-X., Dan J., A more efficient and secure dynamic ID-based remote user authentication scheme. Computer Communications 2009 32 4 583 585 2-s2.0-59649083248 10.1016/j.comcom.2008.11.008
    • (2009) Computer Communications , vol.32 , Issue.4 , pp. 583-585
    • Wang, Y.-Y.1    Liu, J.-Y.2    Xiao, F.-X.3    Dan, J.4
  • 2
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
    • 2-s2.0-78751642788 10.1016/j.comcom.2010.02.011
    • Khan M. K., Kim S.-K., Alghathbar K., Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'. Computer Communications 2011 34 3 305 309 2-s2.0-78751642788 10.1016/j.comcom.2010.02.011
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.K.1    Kim, S.-K.2    Alghathbar, K.3
  • 3
    • 84866619118 scopus 로고    scopus 로고
    • An improved efficient remote password authentication scheme with smart card over insecure network
    • Kumar M., Gupta M. K., Kumari S., An improved efficient remote password authentication scheme with smart card over insecure network. International Journal of Network Security 2011 13 3 167 177
    • (2011) International Journal of Network Security , vol.13 , Issue.3 , pp. 167-177
    • Kumar, M.1    Gupta, M.K.2    Kumari, S.3
  • 4
    • 84866625525 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card
    • 10.2478/s13537-012-0003-y
    • Kumari S., Gupta M. K., Kumar M., Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. Central European Journal of Computer Science 2012 2 1 60 75 10.2478/s13537-012-0003-y
    • (2012) Central European Journal of Computer Science , vol.2 , Issue.1 , pp. 60-75
    • Kumari, S.1    Gupta, M.K.2    Kumar, M.3
  • 5
    • 84906780054 scopus 로고    scopus 로고
    • More efficient key-hash based fingerprint remote authentication scheme using mobile device
    • 10.1007/s00607-013-0308-2
    • Khan M. K., Kumari S., Gupta M. K., More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 2013 10.1007/s00607-013-0308-2
    • (2013) Computing
    • Khan, M.K.1    Kumari, S.2    Gupta, M.K.3
  • 6
    • 84914669082 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'
    • 10.1002/dac.2590
    • Kumari S., Khan M. K., Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'. International Journal of Communication Systems 2013 10.1002/dac.2590
    • (2013) International Journal of Communication Systems
    • Kumari, S.1    Khan, M.K.2
  • 9
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • 2-s2.0-62949130774 10.1109/TWC.2008.080128
    • Das M. L., Two-factor user authentication in wireless sensor networks. IEEE Transactions on Wireless Communications 2009 8 3 1086 1090 2-s2.0-62949130774 10.1109/TWC.2008.080128
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 10
    • 77956388579 scopus 로고    scopus 로고
    • User authentication schemes with pseudonymity for ubiquitous sensor network in NGN
    • 2-s2.0-77956388579 10.1002/dac.1097
    • Vaidya B., Rodrigues J. J. P. C., Park J. H., User authentication schemes with pseudonymity for ubiquitous sensor network in NGN. International Journal of Communication Systems 2010 23 9-10 1201 1222 2-s2.0-77956388579 10.1002/dac.1097
    • (2010) International Journal of Communication Systems , vol.23 , Issue.9-10 , pp. 1201-1222
    • Vaidya, B.1    Rodrigues, J.J.P.C.2    Park, J.H.3
  • 12
    • 77955495427 scopus 로고    scopus 로고
    • Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'
    • 2-s2.0-77955495427 10.3390/s100302450
    • Khan M. K., Alghathbar K., Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'. Sensors 2010 10 3 2450 2459 2-s2.0-77955495427 10.3390/s100302450
    • (2010) Sensors , vol.10 , Issue.3 , pp. 2450-2459
    • Khan, M.K.1    Alghathbar, K.2
  • 13
    • 78650459565 scopus 로고    scopus 로고
    • An enhanced two-factor user authentication scheme in wireless sensor networks
    • 2-s2.0-78650459565
    • He D., Gao Y., Chan S., Chen C., Bu J., An enhanced two-factor user authentication scheme in wireless sensor networks. Ad-Hoc & Sensor Wireless Networks 2010 10 4 1 11 2-s2.0-78650459565
    • (2010) Ad-Hoc & Sensor Wireless Networks , vol.10 , Issue.4 , pp. 1-11
    • He, D.1    Gao, Y.2    Chan, S.3    Chen, C.4    Bu, J.5
  • 15
    • 84856227791 scopus 로고    scopus 로고
    • Body area network for ubiquitous healthcare applications: Theory and implementation
    • 10.1007/s10916-011-9787-x
    • Ullah S., Kwak K. S., Body area network for ubiquitous healthcare applications: theory and implementation. Journal of Medical Systems 2011 35 5 1243 1244 10.1007/s10916-011-9787-x
    • (2011) Journal of Medical Systems , vol.35 , Issue.5 , pp. 1243-1244
    • Ullah, S.1    Kwak, K.S.2
  • 16
    • 84864035796 scopus 로고    scopus 로고
    • A comprehensive survey of wireless body area networks - On PHY, MAC, and network layers solutions
    • 2-s2.0-77955537164 10.1007/s10916-010-9571-3
    • Ullah S., Higgins H., Braem B., Latre B., Blondia C., Moerman I., Saleem S., Rahman Z., Kwak K. S., A comprehensive survey of wireless body area networks-on PHY, MAC, and network layers solutions. Journal of Medical Systems 2012 36 3 1065 1094 2-s2.0-77955537164 10.1007/s10916-010-9571-3
    • (2012) Journal of Medical Systems , vol.36 , Issue.3 , pp. 1065-1094
    • Ullah, S.1    Higgins, H.2    Braem, B.3    Latre, B.4    Blondia, C.5    Moerman, I.6    Saleem, S.7    Rahman, Z.8    Kwak, K.S.9
  • 17
    • 84860122221 scopus 로고    scopus 로고
    • Multi-modal sensing M2M healthcare service in WSN
    • 2-s2.0-84860122221
    • Chung W.-Y., Multi-modal sensing M2M healthcare service in WSN. KSII Transactions on Internet and Information Systems 2012 6 4 1090 1105 2-s2.0-84860122221
    • (2012) KSII Transactions on Internet and Information Systems , vol.6 , Issue.4 , pp. 1090-1105
    • Chung, W.-Y.1
  • 18
    • 84863271667 scopus 로고    scopus 로고
    • E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks
    • 2-s2.0-84857578365 10.3390/s120201625
    • Kumar P., Lee S.-G., Lee H.-J., E-SAP: efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors 2012 12 2 1625 1647 2-s2.0-84857578365 10.3390/s120201625
    • (2012) Sensors , vol.12 , Issue.2 , pp. 1625-1647
    • Kumar, P.1    Lee, S.-G.2    Lee, H.-J.3
  • 19
    • 84878471679 scopus 로고    scopus 로고
    • Cryptanalysis of an 'efficient-strong authentication protocol (e-sap) for healthcare applications using wireless medical sensor networks'
    • Khan M. K., Kumari S., Singh P., Cryptanalysis of an 'efficient-strong authentication protocol (e-sap) for healthcare applications using wireless medical sensor networks'. KSII Transactions on Internet and Information Systems 2013 7 5 967 979
    • (2013) KSII Transactions on Internet and Information Systems , vol.7 , Issue.5 , pp. 967-979
    • Khan, M.K.1    Kumari, S.2    Singh, P.3
  • 21
    • 79952059658 scopus 로고    scopus 로고
    • Lightweight and provably secure user authentication with anonymity for the global mobility network
    • 10.1002/dac.1158
    • Chen C., He D., Chan S., Bu J., Gao Y., Fan R., Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2011 24 3 347 362 10.1002/dac.1158
    • (2011) International Journal of Communication Systems , vol.24 , Issue.3 , pp. 347-362
    • Chen, C.1    He, D.2    Chan, S.3    Bu, J.4    Gao, Y.5    Fan, R.6
  • 23
    • 67349253018 scopus 로고    scopus 로고
    • SAGE: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
    • 2-s2.0-67349253018 10.1109/JSAC.2009.090502
    • Lin X., Lu R., Shen X., Nemoto Y., Kato N., SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE Journal on Selected Areas in Communications 2009 27 4 365 378 2-s2.0-67349253018 10.1109/JSAC.2009.090502
    • (2009) IEEE Journal on Selected Areas in Communications , vol.27 , Issue.4 , pp. 365-378
    • Lin, X.1    Lu, R.2    Shen, X.3    Nemoto, Y.4    Kato, N.5
  • 25
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • Messerges T. S., Dabbish E. A., Sloan R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002 51 5 541 552 2-s2.0-0036566408 10.1109/TC.2002.1004593 (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.