메뉴 건너뛰기




Volumn 39, Issue 3, 2015, Pages

A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the Integrated EPR Information System

Author keywords

AVISPA; Hash function; Integrated EPR information system; Mutual authentication; Password; Security; Smart cards; User authentication

Indexed keywords

ARTICLE; AUTOANALYSIS; ELECTRONIC MEDICAL RECORD; HUMAN; INTERNET; INTERPERSONAL COMMUNICATION; MEDICAL INFORMATION SYSTEM; REGISTRATION; SMART CARD; COMPUTER INTERFACE; COMPUTER SECURITY; CONFIDENTIALITY; DEVICES; INFORMATION SYSTEM; ORGANIZATION AND MANAGEMENT; STANDARDS;

EID: 84922455207     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-015-0204-8     Document Type: Article
Times cited : (20)

References (29)
  • 2
    • 84922453695 scopus 로고    scopus 로고
    • Automated Validation of Internet Security Protocols and Applications, 2013
    • AVISPA, Automated Validation of Internet Security Protocols and Applications, 2013. Accessed on January 2013. http://www.avispa-project.org/.
    • (2013) Accessed on
  • 3
    • 84922425128 scopus 로고    scopus 로고
    • AVISPA Web Tool, 2014
    • AVISPA, AVISPA Web Tool, 2014. Accessed on April 2014. http://www.avispa-project.org/web-interface/expert.php/.
    • (2014) Accessed on
  • 4
    • 19744367735 scopus 로고    scopus 로고
    • A symbolic model checker for security protocols
    • Basin, D., Modersheim, S., OFMC, L. Vigano., A symbolic model checker for security protocols. Int. J. Inf. Secur. 4(3):181–208, 2005.
    • (2005) Int. J. Inf. Secur. , vol.4 , Issue.3 , pp. 181-208
    • Basin, D.1    Modersheim, S.2    OFMC, L.V.3
  • 5
    • 84872112386 scopus 로고    scopus 로고
    • An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
    • Chang, Y.-F., Yu, S.-H., Shiao, D.-R., An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(2):1–9, 2013.
    • (2013) J. Med. Syst. , vol.37 , Issue.2 , pp. 1-9
    • Chang, Y.-F.1    Yu, S.-H.2    Shiao, D.-R.3
  • 6
    • 84928813527 scopus 로고    scopus 로고
    • An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Secur. Commun
    • Chatterjee, S., and Das, A.K., An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Secur. Commun. Netw., 2014. doi:10.1002/sec.1140.
    • (2014) Netw.
    • Chatterjee, S.1    Das, A.K.2
  • 7
    • 81855227196 scopus 로고    scopus 로고
    • Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
    • Das, A.K, Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 5(3):145–151, 2011.
    • (2011) IET Inf. Secur. , vol.5 , Issue.3 , pp. 145-151
    • Das, A.K.1
  • 8
    • 84860729708 scopus 로고    scopus 로고
    • A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks
    • Das, A.K., A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int. J. Inf. Secury. 11(3):189–211, 2012.
    • (2012) Int. J. Inf. Secury. , vol.11 , Issue.3 , pp. 189-211
    • Das, A.K.1
  • 9
    • 84890560968 scopus 로고    scopus 로고
    • A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications
    • Das, A.K., A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications. Netw. Sci. 2(1-2):12–27, 2013.
    • (2013) Netw. Sci. , vol.2 , Issue.1-2 , pp. 12-27
    • Das, A.K.1
  • 11
    • 84887008637 scopus 로고    scopus 로고
    • A novel efficient access control scheme for large-scale distributed wireless sensor networks
    • Das, A.K., Chatterjee, S., Sing, J.K., A novel efficient access control scheme for large-scale distributed wireless sensor networks. Int. J. Found. Comput. Sci. 24(5):625–653, 2013.
    • (2013) Int. J. Found. Comput. Sci. , vol.24 , Issue.5 , pp. 625-653
    • Das, A.K.1    Chatterjee, S.2    Sing, J.K.3
  • 12
    • 84877090869 scopus 로고    scopus 로고
    • A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
    • Das, A.K., and Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(3):1–16, 2013.
    • (2013) J. Med. Syst. , vol.37 , Issue.3 , pp. 1-16
    • Das, A.K.1    Goswami, A.2
  • 13
    • 84878621601 scopus 로고    scopus 로고
    • A novel proxy signature scheme based on user hierarchical access control policy
    • Das, A.K., Massand, A., Patil, S., A novel proxy signature scheme based on user hierarchical access control policy. J. King Saud University - Comput. Inform. Sci. 25(2):219–228, 2013.
    • (2013) J. King Saud University - Comput. Inform. Sci. , vol.25 , Issue.2 , pp. 219-228
    • Das, A.K.1    Massand, A.2    Patil, S.3
  • 14
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Das, M.L., Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3):1086–1090, 2009.
    • (2009) IEEE Trans. Wirel. Commun. , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 15
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198–208, 1983.
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 17
    • 84875510914 scopus 로고    scopus 로고
    • Lee, T.-F., Chang, I.-P., Lin, T.-H., Wang, C.-C., A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 37(3), 2013
    • Lee, T.-F., Chang, I.-P., Lin, T.-H., Wang, C.-C., A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 37(3), 2013.
  • 18
    • 79953289463 scopus 로고    scopus 로고
    • Classification and generation of disturbance vectors for collision attacks against SHA-1
    • Manuel, S., Classification and generation of disturbance vectors for collision attacks against SHA-1. Des. Codes Crypt. 59(1-3):247–263, 2011.
    • (2011) Des. Codes Crypt. , vol.59 , Issue.1-3 , pp. 247-263
    • Manuel, S.1
  • 19
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 20
    • 84919913317 scopus 로고    scopus 로고
    • Mishra, D., On the security flaws in id-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1), 2014
    • Mishra, D., On the security flaws in id-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1), 2014.
  • 22
    • 84901726882 scopus 로고    scopus 로고
    • Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce
    • Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Sys 38(5), 2014.
    • (2014) J. Med. Sys , vol.38 , Issue.5
    • Mishra, D.1    Mukhopadhyay, S.2    Kumari, S.3    Khan, M.K.4
  • 23
    • 84935925341 scopus 로고    scopus 로고
    • Mishra, D., Srinivas, J., Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Sys 38(10), 2014
    • Mishra, D., Srinivas, J., Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Sys 38(10), 2014.
  • 24
    • 78651389846 scopus 로고    scopus 로고
    • A simple and generic construction of authenticated encryption with associated data
    • Sarkar, P., A simple and generic construction of authenticated encryption with associated data. ACM Trans Inf. Syst. Secur. 13(4):33, 2010.
    • (2010) ACM Trans Inf. Syst. Secur. , vol.13 , Issue.4 , pp. 33
    • Sarkar, P.1
  • 26
    • 84922440496 scopus 로고
    • Secure hash standard, FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce
    • Secure Hash Standard: Secure hash standard, FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995 (1995)
    • (1995) April , pp. 1995
  • 27
    • 30744432873 scopus 로고    scopus 로고
    • Some observations on the theory of cryptographic hash functions
    • Stinson, D.R., Some observations on the theory of cryptographic hash functions. Des. Codes Crypt. 38(2):259–277, 2006.
    • (2006) Des. Codes Crypt. , vol.38 , Issue.2 , pp. 259-277
    • Stinson, D.R.1
  • 28
    • 84901732410 scopus 로고    scopus 로고
    • A more secure anonymous user authentication scheme for the integrated EPR information system
    • Wen, F., A more secure anonymous user authentication scheme for the integrated EPR information system. J. Med. Syst. 38(5):42, 2014.
    • (2014) J. Med. Syst. , vol.38 , Issue.5 , pp. 42
    • Wen, F.1
  • 29
    • 84863200393 scopus 로고    scopus 로고
    • A password-based user authentication scheme for the integrated EPR information system
    • Wu, Z.Y., Chung, Y.-F., Lai, F., Chen, T.-S., A password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36(2):631–638, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.2 , pp. 631-638
    • Wu, Z.Y.1    Chung, Y.-F.2    Lai, F.3    Chen, T.-S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.