메뉴 건너뛰기




Volumn 38, Issue 6, 2014, Pages

Cryptanalysis and improvement of Yan et al.'s biometric-based authentication scheme for telecare medicine information systems topical collection on patient facing systems

Author keywords

Biometric; Password; Remote user authentication; Smart card; Telecare medicine information system

Indexed keywords

ARTICLE; AUTOMATION; BIOMETRY; COMPUTER SECURITY; DATA PROCESSING; MEDICAL INFORMATION SYSTEM; REGISTRATION; SMART CARD; TELECARE MEDICINE INFORMATION SYSTEM; TELEMEDICINE; ALGORITHM; DEVICES; STANDARDS;

EID: 84904039251     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-014-0024-2     Document Type: Article
Times cited : (83)

References (37)
  • 1
    • 84904066086 scopus 로고    scopus 로고
    • A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion
    • doi: 10.1002/sec.900
    • Leng, L., Teoh, A.B.J., Li, M., Khan, and M.K., A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Sec. Commun. Netw., 2013. doi: 10.1002/sec.900
    • (2013) Sec. Commun. Netw.
    • Leng, L.1    Teoh, A.B.J.2    Li, M.3    Khan, M.K.4
  • 2
    • 84879569082 scopus 로고    scopus 로고
    • An authentication scheme for secure access to healthcare services
    • Khan, M.K., and Kumari, S., An authentication scheme for secure access to healthcare services. J. Med. Syst. 37(4):1-12, 2012
    • (2012) J. Med. Syst. , vol.37 , Issue.4 , pp. 1-12
    • Khan, M.K.1    Kumari, S.2
  • 3
    • 84883251252 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems
    • Kumari, S., Khan, M.K., and Kumar, R., Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems. J. Med. Syst. 37(4):1-11, 2012
    • (2012) J. Med. Syst. , vol.37 , Issue.4 , pp. 1-11
    • Kumari, S.1    Khan, M.K.2    Kumar, R.3
  • 4
    • 84872481143 scopus 로고    scopus 로고
    • Improved dynamic ID-based authentication scheme for telecare medical information systems
    • Cao, T., and Zhai, J., Improved dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1-7, 2013
    • (2013) J. Med. Syst. , vol.37 , Issue.2 , pp. 1-7
    • Cao, T.1    Zhai, J.2
  • 5
    • 84867867616 scopus 로고    scopus 로고
    • An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems
    • Chen, H.M., Lo, J.W., and Yeh, C.K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907-3915, 2012
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3907-3915
    • Chen, H.M.1    Lo, J.W.2    Yeh, C.K.3
  • 6
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • Debiao, H., Jianhua, C., and Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989-1995, 2012
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1989-1995
    • Debiao, H.1    Jianhua, C.2    Rui, Z.3
  • 7
    • 84872483621 scopus 로고    scopus 로고
    • On the security of a dynamic ID-based authentication scheme for telecare medical information systems
    • Lin, H.Y., On the security of a dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1-5, 2013
    • (2013) J. Med. Syst. , vol.37 , Issue.2 , pp. 1-5
    • Lin, H.Y.1
  • 8
    • 84867869987 scopus 로고    scopus 로고
    • An improved authentication scheme for telecare medicine information systems
    • Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597-3604, 2012
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3597-3604
    • Wei, J.1    Hu, X.2    Liu, W.3
  • 9
    • 84864061174 scopus 로고    scopus 로고
    • A secure authentication scheme for telecare medicine information systems
    • Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529-1535, 2012
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1529-1535
    • Wu, Z.Y.1    Lee, Y.C.2    Lai, F.3    Lee, H.C.4    Chung, Y.5
  • 10
    • 84872120335 scopus 로고    scopus 로고
    • Robust anonymous authentication scheme for telecare medical information systems
    • Xie, Q., Zhang, J., and Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1-8, 2013
    • (2013) J. Med. Syst. , vol.37 , Issue.2 , pp. 1-8
    • Xie, Q.1    Zhang, J.2    Dong, N.3
  • 11
    • 84867843422 scopus 로고    scopus 로고
    • An efficient authentication scheme for telecare medicine information systems
    • Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833-3838, 2012
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3833-3838
    • Zhu, Z.1
  • 12
    • 79952856380 scopus 로고    scopus 로고
    • Cancelable palmcode generated from randomized gabor filters for palmprint template protection
    • Leng, L., Zhang, J., Khan, M.K., Chen, X., Ji, M., and Alghathbar, K., Cancelable palmcode generated from randomized gabor filters for palmprint template protection. Sci. Res. Ess. 6(4):784-792. 2011
    • (2011) Sci. Res. Ess. , vol.6 , Issue.4 , pp. 784-792
    • Leng, L.1    Zhang, J.2    Khan, M.K.3    Chen, X.4    Ji, M.5    Alghathbar, K.6
  • 13
    • 84904066088 scopus 로고    scopus 로고
    • Palmhash code vs palmphasor code
    • Leng, L., and Zhang, J., Palmhash code vs. palmphasor code. Neurocomput., 2012
    • (2012) Neurocomput.
    • Leng, L.1    Zhang, J.2
  • 14
    • 78650819638 scopus 로고    scopus 로고
    • Challenge-response-based biometric image scrambling for secure personal identification
    • Khan, M.K., Zhang, J., and Alghathbar, K., Challenge-response-based biometric image scrambling for secure personal identification. Futur. Gener. Comput. Syst. 27(4):411-418, 2011
    • (2011) Futur. Gener. Comput. Syst. , vol.27 , Issue.4 , pp. 411-418
    • Khan, M.K.1    Zhang, J.2    Alghathbar, K.3
  • 16
    • 84904046919 scopus 로고    scopus 로고
    • An efficient biometrics-based authentication scheme for telecare medicine information systems
    • Tan, Z., An efficient biometrics-based authentication scheme for telecare medicine information systems. Network 2(3):200-204, 2013
    • (2013) Network , vol.2 , Issue.3 , pp. 200-204
    • Tan, Z.1
  • 17
    • 84883088262 scopus 로고    scopus 로고
    • A secure biometrics-based authentication scheme for telecare medicine information systems
    • Yan, X., Li, W., Li, P., Wang, J., Hao, X., and Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(5):1-6, 2013
    • (2013) J. Med. Syst. , vol.37 , Issue.5 , pp. 1-6
    • Yan, X.1    Li, W.2    Li, P.3    Wang, J.4    Hao, X.5    Gong, P.6
  • 18
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
    • DOI 10.1016/j.patcog.2004.04.011, PII S0031320304001876
    • Jin, A.T.B., Ling, D.N.C., and Goh, A., Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recog. 37(11):2245-2255, 2004 (Pubitemid 40134555)
    • (2004) Pattern Recognition , vol.37 , Issue.11 , pp. 2245-2255
    • Jin, A.T.B.1    Ling, D.N.C.2    Goh, A.3
  • 20
    • 33750533142 scopus 로고    scopus 로고
    • An improved BioHashing for human authentication
    • DOI 10.1016/j.patcog.2006.05.030, PII S0031320306002482
    • Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recogn. 40(3):1057-1065, 2007 (Pubitemid 44667748)
    • (2007) Pattern Recognition , vol.40 , Issue.3 , pp. 1057-1065
    • Lumini, A.1    Nanni, L.2
  • 25
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • DOI 10.1109/TC.2002.1004593
    • Messerges, T.S., Dabbish, E.A., and Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541-552, 2002 (Pubitemid 34550462)
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 27
    • 4043177806 scopus 로고    scopus 로고
    • Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards
    • Yang, C.C., Yang, H.W., and Wang, R.C., Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50(2):578-579, 2004
    • (2004) IEEE Trans. Consum. Electron. , vol.50 , Issue.2 , pp. 578-579
    • Yang, C.C.1    Yang, H.W.2    Wang, R.C.3
  • 28
    • 0033365053 scopus 로고    scopus 로고
    • Anonymous channel and authentication in wireless communications
    • Juang, W.S., Lei, C.L., and Chang, C.Y., Anonymous channel and authentication in wireless communications. Comput. Commun. 22(15):1502-1511, 1999
    • (1999) Comput. Commun. , vol.22 , Issue.15 , pp. 1502-1511
    • Juang, W.S.1    Lei, C.L.2    Chang, C.Y.3
  • 29
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme
    • Khan, M.K., Kim, S.K., and Alghathbar, K., Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme. Comput. Commun. 34(3):305-309, 2011
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.K.1    Kim, S.K.2    Alghathbar, K.3
  • 30
    • 78751650071 scopus 로고    scopus 로고
    • An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    • Xu, J., Zhu, W.T., and Feng, D.G., An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun. 34(3):319-325, 2011
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 319-325
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3
  • 31
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • Li, C.T., and Hwang, M.S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1-5, 2010
    • (2010) J. Netw. Comput. Appl. , vol.33 , Issue.1 , pp. 1-5
    • Li, C.T.1    Hwang, M.S.2
  • 32
    • 78649335192 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
    • Li, X., Niu, J.W., Ma, J., Wang, W.D., and Liu, C.L., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34(1):73-79, 2011
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 73-79
    • Li, X.1    Niu, J.W.2    Ma, J.3    Wang, W.D.4    Liu, C.L.5
  • 34
    • 84872112386 scopus 로고    scopus 로고
    • A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
    • Chang, Y.F., Yu, S.H., and Shiao, D.R., A uniqueness-and-anonymity- preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(2):1-9, 2013
    • (2013) J. Med. Syst. , vol.37 , Issue.2 , pp. 1-9
    • Chang, Y.F.1    Yu, S.H.2    Shiao, D.R.3
  • 35
    • 84871955339 scopus 로고    scopus 로고
    • A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
    • Lee, C.C., and Hsu, C.W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1-2):201-211, 2013
    • (2013) Nonlinear Dyn. , vol.71 , Issue.1-2 , pp. 201-211
    • Lee, C.C.1    Hsu, C.W.2
  • 36
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • DOI 10.1109/TMC.2006.16
    • Potlapally, N.R., Ravi, S., Raghunathan, A., and Jha, N.K., A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mobile Comput. 5(2):128-143, 2006 (Pubitemid 43671073)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.R.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.