메뉴 건너뛰기




Volumn 38, Issue 12, 2014, Pages

Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems

Author keywords

Anonymity; Biometric; Key agreement; Security; Telecare medicine information system; Three factor authentication

Indexed keywords

ARTICLE; BIOMETRY; COMPUTER SECURITY; COST; HUMAN; IDENTITY; MEDICAL INFORMATION SYSTEM; PATIENT INFORMATION; PRODUCTIVITY; REGISTRATION; SMART CARD; TELEMEDICINE; CONFIDENTIALITY; INTERNET; ORGANIZATION AND MANAGEMENT; PROCEDURES; STANDARDS; TRENDS;

EID: 84919928059     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-014-0136-8     Document Type: Article
Times cited : (122)

References (52)
  • 1
    • 84905560414 scopus 로고    scopus 로고
    • An improved anonymous authentication scheme for telecare medical information systems
    • Wen, F., Guo D., An improved anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 38(5):1–11, 2014. doi:10.1007/s10916-014-0026-0.
    • (2014) J. Med. Syst. , vol.38 , Issue.5 , pp. 1-11
    • Wen, F.1    Guo, D.2
  • 2
    • 84867867616 scopus 로고    scopus 로고
    • An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems
    • Chen, H. M., Lo, J. W., Yeh, C. K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3907-3915
    • Chen, H.M.1    Lo, J.W.2    Yeh, C.K.3
  • 3
    • 84867860941 scopus 로고    scopus 로고
    • Secure communication of medical information using mobile agents
    • Nikooghadam, M., Zakerolhosseini, A., Secure communication of medical information using mobile agents. J. Med. Syst. 36(6):3839–3850, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3839-3850
    • Nikooghadam, M.1    Zakerolhosseini, A.2
  • 4
    • 84905560661 scopus 로고    scopus 로고
    • On the security of two remote user authentication schemes for telecare medical information systems
    • Kim, K.-W., Lee, J.-D., On the security of two remote user authentication schemes for telecare medical information systems. J. Med. Syst. 2014. doi:10.1007/s10916-014-0017-1.
    • (2014) J. Med. Syst.
    • Kim, K.-W.1    Lee, J.-D.2
  • 5
    • 59649083248 scopus 로고    scopus 로고
    • A more efficient and secure dynamic ID-based remote user authentication scheme
    • Wang, Y.-Y., Liu, J.-Y., Xiao, F.-X., Dan, J., A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32(4):583–585, 2009.
    • (2009) Comput. Commun. , vol.32 , Issue.4 , pp. 583-585
    • Wang, Y.-Y.1    Liu, J.-Y.2    Xiao, F.-X.3    Dan, J.4
  • 6
    • 78751642788 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme
    • Khan, M. K., Kim, S.-K., Alghathbar, K., Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme. Comput. Commun. 34(3):305–309, 2011.
    • (2011) Comput. Commun. , vol.34 , Issue.3 , pp. 305-309
    • Khan, M.K.1    Kim, S.-K.2    Alghathbar, K.3
  • 7
    • 84872120335 scopus 로고    scopus 로고
    • Robust anonymous authentication scheme for telecare medical information systems
    • Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 2013. doi:10.1007/s10916-012-9911-6.
    • (2013) J. Med. Syst.
    • Xie, Q.1    Zhang, J.2    Dong, N.3
  • 8
    • 84872108080 scopus 로고    scopus 로고
    • A privacy enhanced authentication scheme for telecare medical information systems
    • Jiang, Q., Ma, J.F., Ma, Z., Li, G.S., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 2013. doi:10.1007/s10916-012-9897-0.
    • (2013) J. Med. Syst.
    • Jiang, Q.1    Ma, J.F.2    Ma, Z.3    Li, G.S.4
  • 9
    • 84879448131 scopus 로고    scopus 로고
    • Security analysis and improvement of a privacy authentication scheme for telecare medical information systems
    • Wu, F., Xu, L.L., Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J. Med. Syst. 2013. doi:10.1007/s10916-013-9958-z.
    • (2013) J. Med. Syst.
    • Wu, F.1    Xu, L.L.2
  • 10
    • 84864061174 scopus 로고    scopus 로고
    • A secure authentication scheme for telecare medicine information systems
    • Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1529-1535
    • Wu, Z.Y.1    Lee, Y.C.2    Lai, F.3    Lee, H.C.4    Chung, Y.5
  • 11
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • He, D., Chen, J., Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1989-1995
    • He, D.1    Chen, J.2    Zhang, R.3
  • 12
    • 84867869987 scopus 로고    scopus 로고
    • An improved authentication scheme for telecare medicine information systems
    • Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3597-3604
    • Wei, J.1    Hu, X.2    Liu, W.3
  • 13
    • 84867843422 scopus 로고    scopus 로고
    • An efficient authentication scheme for telecare medicine information systems
    • Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3833-3838
    • Zhu, Z.1
  • 14
    • 84879569082 scopus 로고    scopus 로고
    • An authentication scheme for secure access to healthcare services
    • Khan, M.K., Kumari, S., An authentication scheme for secure access to healthcare services. J. Med. Syst. 2013. doi:10.1007/s10916-013-9954-3.
    • (2013) J. Med. Syst.
    • Khan, M.K.1    Kumari, S.2
  • 15
    • 84874803351 scopus 로고    scopus 로고
    • A secure smart-card based authentication and key agreement scheme for telecare medicine information systems
    • Lee, T.-F., Liu, C.-M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 2013. doi:10.1007/s10916-013-9933-8.
    • (2013) J. Med. Syst.
    • Lee, T.-F.1    Liu, C.-M.2
  • 16
    • 84919343487 scopus 로고    scopus 로고
    • Cryptanalysis and security enhancement of Zhu’s authentication scheme for telecare medicine information system
    • Muhaya, F. T. B., Cryptanalysis and security enhancement of Zhu’s authentication scheme for telecare medicine information system. Secur. Commun. Netw. 2014. doi:10.1002/sec.967.
    • (2014) Secur. Commun. Netw.
    • Muhaya, F.T.B.1
  • 17
    • 84897046003 scopus 로고    scopus 로고
    • A study on biometric template security
    • Radha, N., Karthikeyan, S., A study on biometric template security. ICTACT J Soft Comput 1(1):37–41, 2010.
    • (2010) ICTACT J Soft Comput , vol.1 , Issue.1 , pp. 37-41
    • Radha, N.1    Karthikeyan, S.2
  • 18
    • 84881359003 scopus 로고    scopus 로고
    • A biometric authentication scheme for telecare medicine information systems with nonce
    • Awasthi, A. K., Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 2013. doi:10.1007/s10916-013-9964-1.
    • (2013) J. Med. Syst.
    • Awasthi, A.K.1    Srivastava, K.2
  • 19
    • 84901726882 scopus 로고    scopus 로고
    • Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce
    • Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 2014. doi:10.1007/s10916-014-0041-1.
    • (2014) J. Med. Syst.
    • Mishra, D.1    Mukhopadhyay, S.2    Kumari, S.3    Khan, M.K.4    Chaturvedi, A.5
  • 20
    • 84898905921 scopus 로고    scopus 로고
    • A user anonymity preserving three-factor authentication scheme for telecare medicine information systems
    • Tan, Z., A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J. Med. Syst. 2014. doi:10.1007/s10916-014-0016-2.
    • (2014) J. Med. Syst.
    • Tan, Z.1
  • 21
    • 84891784504 scopus 로고    scopus 로고
    • A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems
    • Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems. J. Med. Syst. 2014. doi:10.1007/s10916-013-9994-8.
    • (2014) J. Med. Syst.
    • Xu, X.1    Zhu, P.2    Wen, Q.3    Jin, Z.4    Zhang, H.5    He, L.6
  • 22
    • 84883262804 scopus 로고    scopus 로고
    • An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
    • Das, A. K., Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37, 2013. doi:10.1007/s10916-013-9969-9.
    • (2013) J. Med. Syst , pp. 37
    • Das, A.K.1    Bruhadeshwar, B.2
  • 23
    • 84863200393 scopus 로고    scopus 로고
    • A password-based user authentication scheme for the integrated EPR information system
    • Wu, Z.-Y., Chung, Y., Lai, F., Chen, T.-S., A password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36(2):631–638, 2012. doi:10.1007/s10916-010-9527-7.
    • (2012) J. Med. Syst. , vol.36 , Issue.2 , pp. 631-638
    • Wu, Z.-Y.1    Chung, Y.2    Lai, F.3    Chen, T.-S.4
  • 24
    • 84867864948 scopus 로고    scopus 로고
    • An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
    • Hsiao, T.-C., Liao, Y.-T., Huang, J.-Y., Chen, T.-Z., Horng, G.-B., An Authentication Scheme to Healthcare Security under Wireless Sensor Networks. J. Med. Syst. 36(2):3649–3664, 2012. doi:10.1007/s10916-012-9839-x.
    • (2012) J. Med. Syst. , vol.36 , Issue.2 , pp. 3649-3664
    • Hsiao, T.-C.1    Liao, Y.-T.2    Huang, J.-Y.3    Chen, T.-Z.4    Horng, G.-B.5
  • 25
    • 84883088262 scopus 로고    scopus 로고
    • A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems
    • Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P., A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 37, 2013. doi:10.1007/s10916-013-9972-1.
    • (2013) J. Med. Syst , pp. 37
    • Yan, X.1    Li, W.2    Li, P.3    Wang, J.4    Hao, X.5    Gong, P.6
  • 26
    • 84872481143 scopus 로고    scopus 로고
    • Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
    • Cao, T., Zhai, J., Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems.J. Med. Syst. 37, 2013. doi:10.1007/s10916-012-9912-5.
    • (2013) J. Med. Syst , pp. 37
    • Cao, T.1    Zhai, J.2
  • 27
    • 84872483621 scopus 로고    scopus 로고
    • Lin, H.-Y., On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems. J. Med. Syst. 37, 2013
    • Lin, H.-Y., On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems. J. Med. Syst. 37, 2013. doi:10.1007/s10916-013-9929-4.
  • 28
    • 84872265840 scopus 로고    scopus 로고
    • A chaotic map-based authentication scheme for telecare medicine information systems
    • Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37:9919, 2013. doi:10.1007/s10916-012-9919-y.
    • (2013) J. Med. Syst. , vol.37 , pp. 9919
    • Hao, X.1    Wang, J.2    Yang, Q.3    Yan, X.4    Li, P.5
  • 29
    • 84886744243 scopus 로고    scopus 로고
    • Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
    • Yau, W.-C., Phan, R. C.-W., Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 37:9993, 2013. doi:10.1007/s10916-013-9993-9.
    • (2013) J. Med. Syst. , vol.37 , pp. 9993
    • Yau, W.-C.1    Phan, R.C.-W.2
  • 30
    • 84872112386 scopus 로고    scopus 로고
    • An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
    • Chang, Y.-F., Yu, S.-H., Shiao, D.-R., An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9902, 2013. doi:10.1007/s10916-012-9902-7.
    • (2013) J. Med. Syst , vol.37 , pp. 9902
    • Chang, Y.-F.1    Yu, S.-H.2    Shiao, D.-R.3
  • 31
    • 84877090869 scopus 로고    scopus 로고
    • A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
    • Das, A. K., Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9948, 2013. doi:10.1007/s10916-013-9948-1.
    • (2013) J. Med. Syst. , vol.37 , pp. 9948
    • Das, A.K.1    Goswami, A.2
  • 32
    • 84885502741 scopus 로고    scopus 로고
    • uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
    • Wen, F., A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9980, 2013. doi:10.1007/s10916-013-9980-1.
    • (2013) J. Med. Syst , vol.37 , pp. 9980
    • Wen, F.1    robust, A.2
  • 33
    • 84893021026 scopus 로고    scopus 로고
    • An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem
    • Zhao, Z., An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem. J. Med. Syst. 38, 2014. doi:10.1007/s10916-014-0013-5.
    • (2014) J. Med. Syst , pp. 38
    • Zhao, Z.1
  • 34
    • 84904039251 scopus 로고    scopus 로고
    • Cryptanalysis and Improvement of Yan .’s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems
    • Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and Improvement of Yan et al.’s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38, 2014. doi:10.1007/s10916-014-0024-2.
    • (2014) J. Med. Syst , pp. 38
    • Mishra, D.1    Mukhopadhyay, S.2    Chaturvedi, A.3    Kumari, S.4    Khan, M.K.5
  • 35
    • 84904035979 scopus 로고    scopus 로고
    • An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function
    • Das, A. K., Goswami, A., An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function. J. Med. Syst. 38, 2014. doi:10.1007/s10916-014-0027-z.
    • (2014) J. Med. Syst , pp. 38
    • Das, A.K.1    Goswami, A.2
  • 36
    • 84905560040 scopus 로고    scopus 로고
    • Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care
    • Xie, Q., Liu, W., Wang, S., Han, L., Hu, B., Wu, T., Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care. J. Med. Syst. 38, 2014. doi:10.1007/s10916-014-0091-4.
    • (2014) J. Med. Syst , pp. 38
    • Xie, Q.1    Liu, W.2    Wang, S.3    Han, L.4    Hu, B.5    Wu, T.6
  • 37
    • 84893187211 scopus 로고    scopus 로고
    • Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Med. Syst. 38, 2014
    • Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Med. Syst. 38, 2014. doi:10.1007/s10916-014-0012-6.
  • 38
    • 84905560609 scopus 로고    scopus 로고
    • Li, C.-T., Lee, C.-C., Weng, C.-Y., A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems. J. Med. Syst. 38, 2014
    • Li, C.-T., Lee, C.-C., Weng, C.-Y., A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems. J. Med. Syst. 38, 2014. doi:10.1007/s10916-014-0077-2.
  • 39
    • 84901732410 scopus 로고    scopus 로고
    • A more secure anonymous user authentication scheme for the integrated EPR information system
    • Wen, F., A more secure anonymous user authentication scheme for the integrated EPR information system. J. Med. Syst. 2014. doi:10.1007/s10916-014-0042-0.
    • (2014) J. Med. Syst.
    • Wen, F.1
  • 41
    • 0043135196 scopus 로고    scopus 로고
    • Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments
    • Vanstone, S. A., Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments. Inf. Secur. Tech. Rep. 12:78–87, 1997.
    • (1997) Inf. Secur. Tech. Rep. , vol.12 , pp. 78-87
    • Vanstone, S.A.1
  • 44
    • 84879686596 scopus 로고    scopus 로고
    • Secure Transmission of Mobile Agent in Dynamic Distributed Environments
    • Zakerolhosseini, A., Nikooghadam, M., Secure Transmission of Mobile Agent in Dynamic Distributed Environments. Wireless Personal Communications, 70(2):641–656, 2013. doi:10.1007/s11277-012-0712-5.
    • (2013) Wireless Personal Communications , vol.70 , Issue.2 , pp. 641-656
    • Zakerolhosseini, A.1    Nikooghadam, M.2
  • 45
    • 77956061440 scopus 로고    scopus 로고
    • Efficient utilization of elliptic curve cryptosystem for hierarchical access control
    • Nikooghadam, M., Zakerolhosseini, A., Moghaddam, M.E., Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J. Syst. Softw. 83(10):1917–1929, 2010.
    • (2010) J. Syst. Softw. , vol.83 , Issue.10 , pp. 1917-1929
    • Nikooghadam, M.1    Zakerolhosseini, A.2    Moghaddam, M.E.3
  • 47
    • 35248839355 scopus 로고    scopus 로고
    • Linnartz, J.-P., Tuyls, P., New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proceedings of the Audio- and Video-Based Person Authentication. 2688:393–402, 2003. Guildford, UK
    • Linnartz, J.-P., Tuyls, P., New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proceedings of the Audio- and Video-Based Person Authentication. 2688:393–402, 2003. Guildford, UK. doi:10.1007/3-540-44887-X_47.
  • 49
  • 50
    • 0142002511 scopus 로고    scopus 로고
    • The elliptic curve digital signature algorithm (ECDSA)
    • Johnson, D., Menezes, A., Vanstone, S., The elliptic curve digital signature algorithm (ECDSA). Inter. J. Inf. Secur. 1(1):36–63, 2001. doi:10.1007/s102070100002.
    • (2001) Inter. J. Inf. Secur. , vol.1 , Issue.1 , pp. 36-63
    • Johnson, D.1    Menezes, A.2    Vanstone, S.3
  • 51
    • 69949114528 scopus 로고    scopus 로고
    • Inuma, M., Otsuka, A., Imai, H., Theoretical framework for constructing matching algorithms in biometric authentication systems. In: Proc of ICB’09. Lecture notes in computer science. 5558:806–815, 2009. Springer Berlin Heidelberg
    • Inuma, M., Otsuka, A., Imai, H., Theoretical framework for constructing matching algorithms in biometric authentication systems. In: Proc of ICB’09. Lecture notes in computer science. 5558:806–815, 2009. Springer Berlin Heidelberg. doi:10.1007/978-3-642-01793-3_82.
  • 52
    • 80051571433 scopus 로고    scopus 로고
    • An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
    • He D., Chen J., Hu J., An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf. Fusion 13(3):223–230, 2012.
    • (2012) Inf. Fusion , vol.13 , Issue.3 , pp. 223-230
    • He, D.1    Chen, J.2    Hu, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.