메뉴 건너뛰기




Volumn 39, Issue 11, 2015, Pages

An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography

Author keywords

Anonymity; BioHashing; Elliptic curve cryptography; Impersonation attack; Privacy; ProVerif; Three factor authentication; TMIS

Indexed keywords

ARTICLE; BIOMETRIC AUTHENTICATION; BIOMETRY; ELLIPTIC CURVE CRYPTOGRAPHY; HUMAN; IDENTITY; INFORMATION PROCESSING; MEDICAL INFORMATION SYSTEM; PATIENT IDENTIFICATION; POWER ANALYSIS; REGISTRATION; SMART CARD; TELECARE MEDICINE INFORMATION SYSTEM; TELEMEDICINE; ALGORITHM; COMPUTER SECURITY; CONFIDENTIALITY; DEVICES; WIRELESS COMMUNICATION;

EID: 84942767120     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-015-0335-y     Document Type: Article
Times cited : (69)

References (57)
  • 1
    • 84872108080 scopus 로고    scopus 로고
    • A privacy enhanced authentication scheme for telecare medical information systems
    • Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1), 2013. doi:10.1007/s10916-012-9897-0.
    • (2013) J. Med. Syst , vol.37 , Issue.1
    • Jiang, Q.1    Ma, J.2    Ma, Z.3    Li, G.4
  • 2
    • 84867869987 scopus 로고    scopus 로고
    • An improved authentication scheme for telecare medicine information systems
    • PID: 22374237
    • Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012. doi:10.1007/s10916-012-9835-1.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3597-3604
    • Wei, J.1    Hu, X.2    Liu, W.3
  • 3
    • 84873031582 scopus 로고    scopus 로고
    • An efficient key-management scheme for hierarchical access control in e-medicine system
    • PID: 21526333
    • Wu, S., and Chen, K., An efficient key-management scheme for hierarchical access control in e-medicine system. J. Med. Syst. 36(4):2325–2337, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.4 , pp. 2325-2337
    • Wu, S.1    Chen, K.2
  • 4
    • 84929842561 scopus 로고    scopus 로고
    • A single round-trip sip authentication scheme for voice over internet protocol using smart card
    • http://dx.doi.org/10.1007/s11042-013-1807-z
    • Irshad, A., Sher, M., Rehman, E., Ch, S. A., Hassan, M. U., and Ghani, A., A single round-trip sip authentication scheme for voice over internet protocol using smart card. Multimedia Tools and Applications 74(11): 3967–3984, 2015. doi:10.1007/s11042-013-1807-z.
    • (2015) Multimedia Tools and Applications , vol.74 , Issue.11 , pp. 3967-3984
    • Irshad, A.1    Sher, M.2    Rehman, E.3    Ch, S.A.4    Hassan, M.U.5    Ghani, A.6
  • 6
    • 74149091306 scopus 로고    scopus 로고
    • A new secure password authenticated key agreement scheme for sip using self-certified public keys on elliptic curves
    • Liao, Y.-P., and Wang, S.-S., A new secure password authenticated key agreement scheme for sip using self-certified public keys on elliptic curves. Comput. Commun. 33(3):372–380, 2010.
    • (2010) Comput. Commun. , vol.33 , Issue.3 , pp. 372-380
    • Liao, Y.-P.1    Wang, S.-S.2
  • 7
    • 84928814458 scopus 로고    scopus 로고
    • Comment on ‘robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications’
    • Chaudhry, S. A., Comment on ‘robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications’. IET Commun 9(1):1034–1034, 2015.
    • (2015) IET Commun , vol.9 , Issue.1 , pp. 1034
    • Chaudhry, S.A.1
  • 9
    • 80051571433 scopus 로고    scopus 로고
    • An id-based client authentication with key agreement protocol for mobile client–server environment on ecc with provable security
    • Debiao, H., Jianhua, C., and Jin, H., An id-based client authentication with key agreement protocol for mobile client–server environment on ecc with provable security. Information Fusion 13(3):223–230, 2012.
    • (2012) Information Fusion , vol.13 , Issue.3 , pp. 223-230
    • Debiao, H.1    Jianhua, C.2    Jin, H.3
  • 10
    • 80052774690 scopus 로고    scopus 로고
    • A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
    • Islam, S., and Biswas, G., A more efficient and secure id-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11):1892–1898, 2011.
    • (2011) J. Syst. Softw. , vol.84 , Issue.11 , pp. 1892-1898
    • Islam, S.1    Biswas, G.2
  • 11
    • 84919914712 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems
    • Islam, S., and Khan, M., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10), 2014. doi:10.1007/s10916-014-0135-9.
    • (2014) J. Med. Syst , vol.38 , Issue.10
    • Islam, S.1    Khan, M.2
  • 12
    • 84953364637 scopus 로고    scopus 로고
    • S., Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
    • Farash, M. S., Security analysis and enhancements of an improved authentication for session initiation protocol with provable security. Peer-to-Peer Networking and Applications,1–10, 2014. doi:10.1007/s12083-014-0315-x.
    • (2014) Peer-to-Peer Networking and Applications , pp. 1-10
    • Farash, M.1
  • 13
    • 84905565168 scopus 로고    scopus 로고
    • A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
    • Farash, M. S., and Attari, M. A., A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks. J. Supercomput. 69(1):395–411, 2014.
    • (2014) J. Supercomput. , vol.69 , Issue.1 , pp. 395-411
    • Farash, M.S.1    Attari, M.A.2
  • 14
    • 84919909125 scopus 로고    scopus 로고
    • An efficient and robust rsa-based remote user authentication for telecare medical information systems
    • Giri, D., Maitra, T., Amin, R., and Srivastava, P., An efficient and robust rsa-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1), 2015. doi:10.1007/s10916-014-0145-7.
    • (2015) J. Med. Syst , vol.39 , Issue.1
    • Giri, D.1    Maitra, T.2    Amin, R.3    Srivastava, P.4
  • 15
    • 84902778355 scopus 로고    scopus 로고
    • An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems
    • Farash, M. S., and Attari, M. A., An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems. Information Technology And Control 43 (2):143–150, 2014.
    • (2014) Information Technology And Control , vol.43 , Issue.2 , pp. 143-150
    • Farash, M.S.1    Attari, M.A.2
  • 16
    • 85006172493 scopus 로고    scopus 로고
    • S., An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int. J. Commun
    • Farash, M. S., An improved password-based authentication scheme for session initiation protocol using smart cards without verification table. Int. J. Commun. Syst., 2014. doi:10.1002/dac.2879.
    • (2014) Syst.
    • Farash, M.1
  • 17
    • 84902266968 scopus 로고    scopus 로고
    • An efficient and provably secure three-party password-based authenticated key exchange protocol based on chebyshev chaotic maps
    • Farash, M. S., and Attari, M. A., An efficient and provably secure three-party password-based authenticated key exchange protocol based on chebyshev chaotic maps. Nonlinear Dyn. 77(1-2):399–411, 2014.
    • (2014) Nonlinear Dyn. , vol.77 , Issue.1-2 , pp. 399-411
    • Farash, M.S.1    Attari, M.A.2
  • 18
    • 84904860928 scopus 로고    scopus 로고
    • A secure authentication scheme for session initiation protocol by using ecc on the basis of the tang and liu scheme
    • http://dx.doi.org/10.1002/sec.834
    • Irshad, A., Sher, M., Faisal, M. S., Ghani, A., Ul Hassan, M., and Ch, S. A., A secure authentication scheme for session initiation protocol by using ecc on the basis of the tang and liu scheme. Secur. Commun. Netw. 7(8):1210–1218, 2014. doi:10.1002/sec.834.
    • (2014) Secur. Commun. Netw. , vol.7 , Issue.8 , pp. 1210-1218
    • Irshad, A.1    Sher, M.2    Faisal, M.S.3    Ghani, A.4    Ul Hassan, M.5    Ch, S.A.6
  • 19
    • 85010422698 scopus 로고    scopus 로고
    • K., A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun
    • Farash, M. S., Chaudhry, S. A., Heydari, M., Sajad Sadough, S. M., Kumari, S., and Khan, M. K., A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security. Int. J. Commun. Syst., 2015. doi:10.1002/dac.3019.
    • (2015) Syst.
    • Farash, M.S.1    Chaudhry, S.A.2    Heydari, M.3    Sajad Sadough, S.M.4    Kumari, S.5    Khan, M.6
  • 20
    • 84925507784 scopus 로고    scopus 로고
    • An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
    • Ch, S. A., Uddin, N., Sher, M., Ghani, A., Naqvi, H., and Irshad, A., An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimedia Tools and Applications 74(5):1711–1723, 2015. doi:10.1007/s11042-014-2283-9.
    • (2015) Multimedia Tools and Applications , vol.74 , Issue.5 , pp. 1711-1723
    • Ch, S.A.1    Uddin, N.2    Sher, M.3    Ghani, A.4    Naqvi, H.5    Irshad, A.6
  • 21
    • 84864061174 scopus 로고    scopus 로고
    • A secure authentication scheme for telecare medicine information systems
    • PID: 20978928
    • Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012. doi:10.1007/s10916-010-9614-9.
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1529-1535
    • Wu, Z.-Y.1    Lee, Y.-C.2    Lai, F.3    Lee, H.-C.4    Chung, Y.5
  • 22
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • PID: 21360017
    • Debiao, H., Jianhua, C., and Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012. doi:10.1007/s10916-011-9658-5.
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1989-1995
    • Debiao, H.1    Jianhua, C.2    Rui, Z.3
  • 23
    • 84867843422 scopus 로고    scopus 로고
    • An efficient authentication scheme for telecare medicine information systems
    • PID: 22527784
    • Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833–3838, 2012. doi:10.1007/s10916-012-9856-9.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3833-3838
    • Zhu, Z.1
  • 24
    • 84928669844 scopus 로고    scopus 로고
    • An improved anonymous authentication scheme for telecare medical information systems
    • Wen, F., and Guo, D., An improved anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 36(5):1–11, 2015. doi:10.1007/s10916-015-0244-0.
    • (2015) J. Med. Syst. , vol.36 , Issue.5 , pp. 1-11
    • Wen, F.1    Guo, D.2
  • 25
    • 84891784504 scopus 로고    scopus 로고
    • A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems
    • Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., and He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):1–7, 2013.
    • (2013) J. Med. Syst. , vol.38 , Issue.1 , pp. 1-7
    • Xu, X.1    Zhu, P.2    Wen, Q.3    Jin, Z.4    Zhang, H.5    He, L.6
  • 26
    • 84928669844 scopus 로고    scopus 로고
    • Chaudhry, S. A., Naqvi, H., Shon, T., Sher, M., and Farash, M. S., Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. J. Med. Syst. 39(6)
    • Chaudhry, S. A., Naqvi, H., Shon, T., Sher, M., and Farash, M. S., Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. J. Med. Syst. 39(6).
  • 27
    • 84883251252 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems
    • Kumari, S., Khan, M. K., and Kumar, R., Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems. J. Med. Syst. 37(4), 2013. doi:10.1007/s10916-013-9952-5.
    • (2013) J. Med. Syst , vol.37 , Issue.4
    • Kumari, S.1    Khan, M.K.2    Kumar, R.3
  • 28
    • 84893037497 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an efficient and secure dynamic id-based authentication scheme for telecare medical information systems
    • Khan, M. K., and Kumari, S., Cryptanalysis and improvement of an efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Secur. Commun. Netw. 7(2):399–408, 2014. doi:10.1002/sec.791.
    • (2014) Secur. Commun. Netw. , vol.7 , Issue.2 , pp. 399-408
    • Khan, M.K.1    Kumari, S.2
  • 29
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 31
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • Li, C.-T., and Hwang, M.-S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1–5, 2010.
    • (2010) J. Netw. Comput. Appl. , vol.33 , Issue.1 , pp. 1-5
    • Li, C.-T.1    Hwang, M.-S.2
  • 32
    • 84919951345 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multiserver environment
    • He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 4(1):253–264, 2014.
    • (2014) IEEE Syst. J. , vol.4 , Issue.1 , pp. 253-264
    • He, D.1    Wang, D.2
  • 33
    • 84904039251 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems
    • Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., and Khan, M. K., Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38 (6):1–12, 2014.
    • (2014) J. Med. Syst. , vol.38 , Issue.6 , pp. 1-12
    • Mishra, D.1    Mukhopadhyay, S.2    Chaturvedi, A.3    Kumari, S.4    Khan, M.K.5
  • 34
    • 84919949740 scopus 로고    scopus 로고
    • Secure privacy-preserving biometric authentication scheme for telecare medicine information systems
    • COI: 1:CAS:528:DC%2BC2cXps1Ontr4%3D
    • Li, X., Wen, Q., Li, W., Zhang, H., and Jin, Z., Secure privacy-preserving biometric authentication scheme for telecare medicine information systems. J. Med. Syst. 38(11):1–8, 2014.
    • (2014) J. Med. Syst. , vol.38 , Issue.11 , pp. 1-8
    • Li, X.1    Wen, Q.2    Li, W.3    Zhang, H.4    Jin, Z.5
  • 35
    • 67549132170 scopus 로고    scopus 로고
    • Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic world
    • Khan, M. K., Fingerprint biometric-based self-authentication and deniable authentication schemes for the electronic world. IETE Tech. Rev. 26(3):191–195, 2009.
    • (2009) IETE Tech. Rev. , vol.26 , Issue.3 , pp. 191-195
    • Khan, M.K.1
  • 36
    • 33745634868 scopus 로고    scopus 로고
    • An efficient and practical fingerprint-based remote user authentication scheme with smart cards
    • Khan, M. K., and Zhang, J., An efficient and practical fingerprint-based remote user authentication scheme with smart cards. In: Information Security Practice and Experience, Springer, pp. 260–268 (2006)
    • (2006) Information Security Practice and Experience, Springer , pp. 260-268
    • Khan, M.K.1    Zhang, J.2
  • 37
    • 84932615516 scopus 로고    scopus 로고
    • A secure three-factor user authentication and key agreement protocol for tmis with user anonymity
    • Amin, R., and Biswas, G., A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J. Med. Syst. 39(8):1–19, 2015.
    • (2015) J. Med. Syst. , vol.39 , Issue.8 , pp. 1-19
    • Amin, R.1    Biswas, G.2
  • 38
    • 84933506630 scopus 로고    scopus 로고
    • An improved RSA based user authentication and session key agreement protocol usable in TMIS
    • Amin, R., and Biswas, G., An improved RSA based user authentication and session key agreement protocol usable in TMIS. J. Med. Syst. 39(8):1–14, 2015.
    • (2015) J. Med. Syst. , vol.39 , Issue.8 , pp. 1-14
    • Amin, R.1    Biswas, G.2
  • 39
    • 84923296566 scopus 로고    scopus 로고
    • A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS
    • Amin, R., and Biswas, G., A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS. J. Med. Syst. 39(3):1–17, 2015.
    • (2015) J. Med. Syst. , vol.39 , Issue.3 , pp. 1-17
    • Amin, R.1    Biswas, G.2
  • 40
    • 84881359003 scopus 로고    scopus 로고
    • A biometric authentication scheme for telecare medicine information systems with nonce
    • Awasthi, A. K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):1–4, 2013.
    • (2013) J. Med. Syst. , vol.37 , Issue.5 , pp. 1-4
    • Awasthi, A.K.1    Srivastava, K.2
  • 41
    • 84898905921 scopus 로고    scopus 로고
    • A user anonymity preserving three-factor authentication scheme for telecare medicine information systems
    • Tan, Z., A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J. Med. Syst. 38(3):1–9, 2014.
    • (2014) J. Med. Syst. , vol.38 , Issue.3 , pp. 1-9
    • Tan, Z.1
  • 42
    • 84919928059 scopus 로고    scopus 로고
    • Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems
    • Arshad, H., and Nikooghadam, M., Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(12):1–12, 2014.
    • (2014) J. Med. Syst. , vol.38 , Issue.12 , pp. 1-12
    • Arshad, H.1    Nikooghadam, M.2
  • 43
    • 84923090025 scopus 로고    scopus 로고
    • An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem
    • Lu, Y., Li, L., Peng, H., and Yang, Y., An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J. Med. Syst. 39(3):1–8, 2015.
    • (2015) J. Med. Syst. , vol.39 , Issue.3 , pp. 1-8
    • Lu, Y.1    Li, L.2    Peng, H.3    Yang, Y.4
  • 44
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: two factor authentication featuring fingerprint data and tokenised random number
    • Jin, A. T. B., Ling, D. N. C., and Goh, A., Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 37(11):2245–2255, 2004.
    • (2004) Pattern Recogn. , vol.37 , Issue.11 , pp. 2245-2255
    • Jin, A.T.B.1    Ling, D.N.C.2    Goh, A.3
  • 45
    • 33750533142 scopus 로고    scopus 로고
    • An improved biohashing for human authentication
    • Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recogn. 40(3): 1057–1065, 2007.
    • (2007) Pattern Recogn. , vol.40 , Issue.3 , pp. 1057-1065
    • Lumini, A.1    Nanni, L.2
  • 46
    • 84904066086 scopus 로고    scopus 로고
    • A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion
    • Leng, L., Teoh, A. B. J., Li, M., and Khan, M. K., A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Secur. Commun. Netw. 7(11):1860–1871, 2014.
    • (2014) Secur. Commun. Netw. , vol.7 , Issue.11 , pp. 1860-1871
    • Leng, L.1    Teoh, A.B.J.2    Li, M.3    Khan, M.K.4
  • 47
    • 84925674999 scopus 로고    scopus 로고
    • Alignment-free row-co-occurrence cancelable palmprint fuzzy vault
    • Leng, L., and Teoh, A. B. J., Alignment-free row-co-occurrence cancelable palmprint fuzzy vault. Pattern Recogn. 48(7):2290–2303, 2015.
    • (2015) Pattern Recogn. , vol.48 , Issue.7 , pp. 2290-2303
    • Leng, L.1    Teoh, A.B.J.2
  • 48
    • 84901726882 scopus 로고    scopus 로고
    • Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce
    • Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., and Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38(5):1–11, 2014.
    • (2014) J. Med. Syst. , vol.38 , Issue.5 , pp. 1-11
    • Mishra, D.1    Mukhopadhyay, S.2    Kumari, S.3    Khan, M.K.4    Chaturvedi, A.5
  • 49
  • 52
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Dolev, D., and Yao, A. C., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198–208, 1983.
    • (1983) IEEE Trans. Inf. Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 53
    • 33747592366 scopus 로고    scopus 로고
    • Breaking a remote user authentication scheme for multi-server architecture
    • Cao, X., and Zhong, S., Breaking a remote user authentication scheme for multi-server architecture. IEEE Commun. Lett. 10(8):580–581, 2006.
    • (2006) IEEE Commun. Lett. , vol.10 , Issue.8 , pp. 580-581
    • Cao, X.1    Zhong, S.2
  • 55
    • 84958043300 scopus 로고    scopus 로고
    • A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography
    • Chaudhry, S. A., Farash, M. S., Naqvi, H., and Sher, M., A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electron. Commer. Res., 1–27, 2015. doi:10.1007/s10660-015-9192-5.
    • (2015) Electron. Commer. Res. , pp. 1-27
    • Chaudhry, S.A.1    Farash, M.S.2    Naqvi, H.3    Sher, M.4
  • 56
    • 84933564535 scopus 로고    scopus 로고
    • K., An enhanced privacy preserving remote user authentication scheme with provable security
    • Chaudhry, S. A., Farash, M. S., Naqvi, H., Kumari, S., and Khan, M. K., An enhanced privacy preserving remote user authentication scheme with provable security. Secur. Commun. Netw., 1–13, 2015. doi:10.1002/sec.1299.
    • (2015) Secur. Commun. Netw. , pp. 1-13
    • Chaudhry, S.A.1    Farash, M.S.2    Naqvi, H.3    Kumari, S.4    Khan, M.5
  • 57
    • 84904544082 scopus 로고    scopus 로고
    • Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems
    • PID: 25047235
    • Xie, Q., Hu, B., Dong, N., and Wong, D. S., Anonymous three-party password-authenticated key exchange scheme for telecare medical information systems. PloS one 9(7):e102747, 2014.
    • (2014) PloS one , vol.9 , Issue.7 , pp. e102747
    • Xie, Q.1    Hu, B.2    Dong, N.3    Wong, D.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.