메뉴 건너뛰기




Volumn 39, Issue 1, 2015, Pages

An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems

Author keywords

Attack; Authentication; Password; Smart Card; TMIS

Indexed keywords

ARTICLE; CONTROLLED STUDY; HEALTH SERVICE; HUMAN; INTERPERSONAL COMMUNICATION; MEDICAL INFORMATION SYSTEM; REGISTRATION; SMART CARD; TELECARE MEDICAL INFORMATION SYSTEM; TELEHEALTH; COMPUTER INTERFACE; COMPUTER SECURITY; CONFIDENTIALITY; DEVICES; ELECTRONIC MEDICAL RECORD; INTERNET; PROCEDURES; TELEMEDICINE;

EID: 84919909125     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-014-0145-7     Document Type: Article
Times cited : (91)

References (16)
  • 1
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport, L., Password authentication with insecure communication. Commun. ACM 24(11):770–772, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 2
    • 0034140374 scopus 로고    scopus 로고
    • A new remote user authentication scheme using smart cards
    • Hwang, M.S., and Li, L.H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1):28–30, 2000.
    • (2000) IEEE Trans. Consum. Electron. , vol.46 , Issue.1 , pp. 28-30
    • Hwang, M.S.1    Li, L.H.2
  • 3
    • 36349005859 scopus 로고    scopus 로고
    • Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
    • Lee, N.Y., Wu, C.N., Wang, C.C., Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings. Comput. Electr. Eng. 34(1):12–20, 2008.
    • (2008) Comput. Electr. Eng. , vol.34 , Issue.1 , pp. 12-20
    • Lee, N.Y.1    Wu, C.N.2    Wang, C.C.3
  • 4
    • 63049116480 scopus 로고    scopus 로고
    • An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    • Yang, J.H., and Chang, C.C., An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3–4):138–143, 2009.
    • (2009) Comput. Secur. , vol.28 , Issue.3-4 , pp. 138-143
    • Yang, J.H.1    Chang, C.C.2
  • 5
    • 79952538982 scopus 로고    scopus 로고
    • Provably secure and efficient identification and key agreement protocol with user anonymity
    • Wang, R.C., Juang, W.S., Lei, C.L., Provably secure and efficient identification and key agreement protocol with user anonymity. J. Comput Syst. Sci. 77(4):790–798, 2011.
    • (2011) J. Comput Syst. Sci. , vol.77 , Issue.4 , pp. 790-798
    • Wang, R.C.1    Juang, W.S.2    Lei, C.L.3
  • 6
    • 84863985527 scopus 로고    scopus 로고
    • A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    • He, D., Chen, J., Chen, Y., A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur. Commun. Netw. 5(12):1423–1429, 2012.
    • (2012) Secur. Commun. Netw. , vol.5 , Issue.12 , pp. 1423-1429
    • He, D.1    Chen, J.2    Chen, Y.3
  • 7
    • 84864061174 scopus 로고    scopus 로고
    • A secure authentication scheme for telecare medicine information systems
    • Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1529-1535
    • Wu, Z.Y.1    Lee, Y.C.2    Lai, F.3    Lee, H.C.4    Chung, Y.5
  • 8
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • Shor, P., Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5):1484–1509, 1997.
    • (1997) SIAM J. Comput. , vol.26 , Issue.5 , pp. 1484-1509
    • Shor, P.1
  • 9
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • He, D., Chen, J., Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1989-1995
    • He, D.1    Chen, J.2    Zhang, R.3
  • 10
    • 84867869987 scopus 로고    scopus 로고
    • An improved authentication scheme for telecare medicine information systems
    • Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3597-3604
    • Wei, J.1    Hu, X.2    Liu, W.3
  • 11
    • 84867843422 scopus 로고    scopus 로고
    • An efficient authentication scheme for telecare medicine information systems
    • Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833–3838, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3833-3838
    • Zhu, Z.1
  • 12
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120–126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 13
    • 84879569082 scopus 로고    scopus 로고
    • Authentication scheme for secure access to healthcare services
    • Khan, M.K., and Kumari, S., Authentication scheme for secure access to healthcare services. J. Med. Syst. 37(4):1–12, 2013.
    • (2013) J. Med. Syst. , vol.37 , Issue.4 , pp. 1-12
    • Khan, M.K.1    Kumari, S.2
  • 15
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 16
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • Potlapally, N., Ravi, S., Raghunathan, A., Jha, N., A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mobile Comput. 5(2):128–143, 2006.
    • (2006) IEEE Trans. Mobile Comput. , vol.5 , Issue.2 , pp. 128-143
    • Potlapally, N.1    Ravi, S.2    Raghunathan, A.3    Jha, N.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.