메뉴 건너뛰기




Volumn 38, Issue 6, 2014, Pages

An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function topical collection on transactional processing systems

Author keywords

Anonymity; AVISPA; Biohashing; Biometrics; Chaotic hash function; Password; Security; Telecare medicine information systems

Indexed keywords

ARTICLE; AUTOMATION; BIOMETRY; COMPUTER SECURITY; HUMAN; INFORMATION PROCESSING; MEDICAL INFORMATION SYSTEM; REMOTE SENSING; TELEMEDICINE; VALIDATION PROCESS;

EID: 84904035979     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-014-0027-z     Document Type: Article
Times cited : (33)

References (30)
  • 1
    • 84904062321 scopus 로고    scopus 로고
    • Accessed Jan 2013
    • AVISPA: Automated validation of internet security protocols and applications. http://www.avispa-project.org/. Accessed Jan 2013.
  • 2
    • 84904055078 scopus 로고    scopus 로고
    • Accessed Sept 2013
    • AVISPA: AVISPA Web Tool. http://www.avispa-project.org/web-interface/ expert.php/. Accessed Sept 2013.
    • AVISPA: AVISPA Web Tool
  • 3
    • 84881359003 scopus 로고    scopus 로고
    • A biometric authentication scheme for telecare medicine information systems with nonce
    • Awasthi, A. K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):1-4, 2013.
    • (2013) J. Med. Syst. , vol.37 , Issue.5 , pp. 1-4
    • Awasthi, A.K.1    Srivastava, K.2
  • 5
    • 84872112386 scopus 로고    scopus 로고
    • An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
    • Chang, Y.-F., Yu, S.-H., and Shiao, D.-R., An uniqueness-and-anonymity- preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9902, 2013.
    • (2013) J. Med. Syst. , vol.37 , pp. 9902
    • Chang, Y.-F.1    Yu, S.-H.2    Shiao, D.-R.3
  • 6
    • 84872112386 scopus 로고    scopus 로고
    • An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
    • Chang, Y.-F., Yu, S.-H., and Shiao, D.-R., An uniqueness-and-anonymity- preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:1-9, 2013.
    • (2013) J. Med. Syst. , vol.37 , pp. 1-9
    • Chang, Y.-F.1    Yu, S.-H.2    Shiao, D.-R.3
  • 7
    • 81855227196 scopus 로고    scopus 로고
    • Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
    • Das, A. K., Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Sec. 5(3):145-151, 2011.
    • (2011) IET Inf. Sec. , vol.5 , Issue.3 , pp. 145-151
    • Das, A.K.1
  • 8
    • 84890560968 scopus 로고    scopus 로고
    • A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications
    • Das, A. K., A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw. Sci. 2(1-2):12-27, 2013.
    • (2013) Netw. Sci. , vol.2 , Issue.1-2 , pp. 12-27
    • Das, A.K.1
  • 9
    • 84877090869 scopus 로고    scopus 로고
    • A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
    • Das, A. K., and Goswami, A., A secure and efficient uniqueness-and- anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(3):1-16, 2013.
    • (2013) J. Med. Syst. , vol.37 , Issue.3 , pp. 1-16
    • Das, A.K.1    Goswami, A.2
  • 10
    • 84878621601 scopus 로고    scopus 로고
    • A novel proxy signature scheme based on user hierarchical access control policy
    • Das, A. K., Massand, A., and Patil, S., A novel proxy signature scheme based on user hierarchical access control policy. J. King Saud University - Comput. Inf. Sci. 25(2):219-228, 2013.
    • (2013) J. King Saud University - Comput. Inf. Sci. , vol.25 , Issue.2 , pp. 219-228
    • Das, A.K.1    Massand, A.2    Patil, S.3
  • 11
    • 84862699099 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
    • Das, A. K., Paul, N. R., and Tripathy, L., Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Inf. Sci. 209:80-92, 2012.
    • (2012) Inf. Sci. , vol.209 , pp. 80-92
    • Das, A.K.1    Paul, N.R.2    Tripathy, L.3
  • 12
    • 84883262804 scopus 로고    scopus 로고
    • An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
    • Das, A. K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(5):1-17, 2013.
    • (2013) J. Med. Syst. , vol.37 , Issue.5 , pp. 1-17
    • Das, A.K.1    Bruhadeshwar, B.2
  • 13
    • 4043122631 scopus 로고    scopus 로고
    • A dynamic ID-based remote user authentication scheme
    • Das, M. L., Saxena, A., and Gulati, V. P., A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2):629-631, 2004.
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , Issue.2 , pp. 629-631
    • Das, M.L.1    Saxena, A.2    Gulati, V.P.3
  • 14
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory. 29(2):198-208, 1983.
    • (1983) IEEE Trans. Inf. Theory. , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 15
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang, M.-S., and Li, L.-H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1): 28-30, 2000.
    • (2000) IEEE Trans. Consum. Electron. , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.-S.1    Li, L.-H.2
  • 17
    • 84892599400 scopus 로고    scopus 로고
    • Smart card based remote user authentication schemes: A survey
    • Jaspher, G., Kathrine, W., Kirubakaran, E., and Prakash, P., Smart card based remote user authentication schemes: A survey. Procedia Eng. 38:1318-1326, 2012.
    • (2012) Procedia Eng. , vol.38 , pp. 1318-1326
    • Jaspher, G.1    Kathrine, W.2    Kirubakaran, E.3    Prakash, P.4
  • 18
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
    • DOI 10.1016/j.patcog.2004.04.011, PII S0031320304001876
    • Jina, A. T. B., Linga, D. N. C., and Goh, A., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recog. 37(11):2245-2255, 2004. (Pubitemid 40134555)
    • (2004) Pattern Recognition , vol.37 , Issue.11 , pp. 2245-2255
    • Jin, A.T.B.1    Ling, D.N.C.2    Goh, A.3
  • 19
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'
    • Khan, M. K., Kim, S.-K., and Alghathbar, K., Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'. Comput Commun. 34(3):305-309, 2011.
    • (2011) Comput Commun. , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.K.1    Kim, S.-K.2    Alghathbar, K.3
  • 21
    • 0019634370 scopus 로고
    • Password authentification with insecure communication
    • Lamport, L., Password authentification with insecure communication. Commun. ACM. 24(11):770-772, 1981.
    • (1981) Commun. ACM. , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 22
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometric-based remote user authentication scheme using smart cards
    • Li, C.-T., and Hwang, M.-S., An efficient biometric-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33:1-5, 2010.
    • (2010) J. Netw. Comput. Appl. , vol.33 , pp. 1-5
    • Li, C.-T.1    Hwang, M.-S.2
  • 24
    • 78649335192 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
    • Li, X., Niu, J.-W., Ma, J., Wang, W.-D., and Liu, C.-L., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34:73-79, 2011.
    • (2011) J. Netw. Comput. Appl. , vol.34 , pp. 73-79
    • Li, X.1    Niu, J.-W.2    Ma, J.3    Wang, W.-D.4    Liu, C.-L.5
  • 25
    • 33750533142 scopus 로고    scopus 로고
    • An improved BioHashing for human authentication
    • DOI 10.1016/j.patcog.2006.05.030, PII S0031320306002482
    • Lumini, A., and Nanni, L., An improved BioHashing for human authentication. Pattern Recog. 40(3):1057-1065, 2007. (Pubitemid 44667748)
    • (2007) Pattern Recognition , vol.40 , Issue.3 , pp. 1057-1065
    • Lumini, A.1    Nanni, L.2
  • 26
    • 84860376061 scopus 로고    scopus 로고
    • Dynamic ID-based remote user password authentication schemes using smart cards: A review
    • Madhusudhan, R., and Mittal, R. C., Dynamic ID-based remote user password authentication schemes using smart cards: A review. J. Netw. Comput. Appl. 35(4):1235-1248, 2012.
    • (2012) J. Netw. Comput. Appl. , vol.35 , Issue.4 , pp. 1235-1248
    • Madhusudhan, R.1    Mittal, R.C.2
  • 27
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541-552, 2002. (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 28
    • 84873351776 scopus 로고    scopus 로고
    • An effective and secure key-management scheme for hierarchical access control in e-medicine system
    • Odelu, V., Das, A. K., and Goswami, A., An effective and secure key-management scheme for hierarchical access control in e-medicine system. J. Med. Syst. 37(2):1-18, 2013.
    • (2013) J. Med. Syst. , vol.37 , Issue.2 , pp. 1-18
    • Odelu, V.1    Das, A.K.2    Goswami, A.3
  • 29
    • 59649083248 scopus 로고    scopus 로고
    • A more efficient and secure dynamic ID-based remote user authentication scheme
    • Wang, Y.-Y., Liu, J.-Y., Xiao, F.-X., and Dan, J., A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32(4):583-585, 2009.
    • (2009) Comput. Commun. , vol.32 , Issue.4 , pp. 583-585
    • Wang, Y.-Y.1    Liu, J.-Y.2    Xiao, F.-X.3    Dan, J.4
  • 30
    • 9644303109 scopus 로고    scopus 로고
    • One-way hash function construction based on the chaotic map with changeable-parameter
    • Xiao, D., Liao, X., and Deng, S., One-way hash function construction based on the chaotic map with changeable-parameter. Chaos, Solitons Fractals. 241:65-71, 2005.
    • (2005) Chaos, Solitons Fractals. , vol.241 , pp. 65-71
    • Xiao, D.1    Liao, X.2    Deng, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.