메뉴 건너뛰기




Volumn 2015, Issue , 2015, Pages

An Elliptic Curve Cryptography-Based RFID Authentication Securing E-Health System

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; ELECTRONIC DOCUMENT EXCHANGE; GEOMETRY; HEALTH; MEDICAL COMPUTING; MOBILE RADIO SYSTEMS; PUBLIC KEY CRYPTOGRAPHY;

EID: 84954429881     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2015/642425     Document Type: Article
Times cited : (32)

References (25)
  • 2
    • 84867297288 scopus 로고    scopus 로고
    • Two RFID-based solutions for secure inpatient medication administration
    • Y.-C. Yen, N.-W. Lo, and T.-C. Wu, "Two RFID-based solutions for secure inpatient medication administration," Journal of Medical Systems, vol. 36, no. 5, pp. 2769-2778, 2012.
    • (2012) Journal of Medical Systems , vol.36 , Issue.5 , pp. 2769-2778
    • Yen, Y.-C.1    Lo, N.-W.2    Wu, T.-C.3
  • 3
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues for RFID systems
    • Y. Chen, J.-S. Chou, and H.-M. Sun, "A novel mutual authentication scheme based on quadratic residues for RFID systems," Computer Networks, vol. 52, no. 12, pp. 2373-2380, 2008.
    • (2008) Computer Networks , vol.52 , Issue.12 , pp. 2373-2380
    • Chen, Y.1    Chou, J.-S.2    Sun, H.-M.3
  • 4
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 5
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Lecture Notes in Computer Science, Springer, Berlin, Germany
    • V. Miller, "Use of elliptic curves in cryptography," in Advances in Cryptology-CRYPTO '85 Proceedings, vol. 218 of Lecture Notes in Computer Science, pp. 417-426, Springer, Berlin, Germany, 1985.
    • (1985) Advances in Cryptology-CRYPTO '85 Proceedings , vol.218 , pp. 417-426
    • Miller, V.1
  • 6
    • 49049105964 scopus 로고    scopus 로고
    • EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
    • Las Vegas, Nev, USA, April
    • Y. Lee, L. Batina, and I. Verbauwhede, "EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol," in IEEE International Conference on RFID, pp. 97-104, Las Vegas, Nev, USA, April 2008.
    • (2008) IEEE International Conference on RFID , pp. 97-104
    • Lee, Y.1    Batina, L.2    Verbauwhede, I.3
  • 9
    • 84899644274 scopus 로고    scopus 로고
    • A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
    • Y.-P. Liao and C.-M. Hsiao, "A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol," Ad Hoc Networks, vol. 18, pp. 133-146, 2014.
    • (2014) Ad Hoc Networks , vol.18 , pp. 133-146
    • Liao, Y.-P.1    Hsiao, C.-M.2
  • 11
    • 84898905921 scopus 로고    scopus 로고
    • A user anonymity preserving three-factor authentication scheme for telecaremedicine information systems
    • Z. Tan, "A user anonymity preserving three-factor authentication scheme for telecaremedicine information systems," Journal of Medical Systems, vol. 38, article 16, 2014.
    • (2014) Journal of Medical Systems , vol.38
    • Tan, Z.1
  • 12
    • 84919928059 scopus 로고    scopus 로고
    • Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems
    • H. Arshad and M. Nikooghadam, "Three-factor anonymous authentication and key agreement scheme for Telecare Medicine Information Systems," Journal of Medical Systems, vol. 38, no. 12, article 136, 2014.
    • (2014) Journal of Medical Systems , vol.38 , Issue.12
    • Arshad, H.1    Nikooghadam, M.2
  • 13
    • 84936743193 scopus 로고    scopus 로고
    • Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol
    • D. He, N. Kumar, N. Chilamkurti, and J.-H. Lee, "Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol," Journal of Medical Systems, vol. 38, article 116, 2014.
    • (2014) Journal of Medical Systems , vol.38
    • He, D.1    Kumar, N.2    Chilamkurti, N.3    Lee, J.-H.4
  • 15
    • 0027662341 scopus 로고
    • Reducing elliptic curve logarithms to logarithms in a finite field
    • A. J. Menezes, T. Okamoto, and S. Vanstone, "Reducing elliptic curve logarithms to logarithms in a finite field," IEEE Transactions on Information Theory, vol. 39, no. 5, pp. 1639-1646, 1993.
    • (1993) IEEE Transactions on Information Theory , vol.39 , Issue.5 , pp. 1639-1646
    • Menezes, A.J.1    Okamoto, T.2    Vanstone, S.3
  • 16
    • 8344247772 scopus 로고    scopus 로고
    • New identitybased society oriented signature schemes from pairings on elliptic curves
    • C.-Y. Lin, T.-C. Wu, F. Zhang, and J.-J. Hwang, "New identitybased society oriented signature schemes from pairings on elliptic curves," Applied Mathematics and Computation, vol. 160, no. 1, pp. 245-260, 2005.
    • (2005) Applied Mathematics and Computation , vol.160 , Issue.1 , pp. 245-260
    • Lin, C.-Y.1    Wu, T.-C.2    Zhang, F.3    Hwang, J.-J.4
  • 18
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Lecture Notes in Computer Science
    • D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing," in Advances in Cryptology-CRYPTO 2001, vol. 2139 of Lecture Notes in Computer Science, pp. 213-229, 2001.
    • (2001) Advances in Cryptology-CRYPTO 2001 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 19
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Lecture Notes in Computer Science, Springer, Berlin, Germany
    • D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," in Advances in Cryptology-ASIACRYPT 2001, vol. 2248 of Lecture Notes in Computer Science, pp. 514-532, Springer, Berlin, Germany, 2001.
    • (2001) Advances in Cryptology-ASIACRYPT 2001 , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 23
    • 0345851235 scopus 로고    scopus 로고
    • Embedding the internet wireless integrated network sensors
    • J. Pottie and W. J. Kaiser, "Embedding the internet wireless integrated network sensors," Communications of the ACM, vol. 43, no. 5, pp. 51-58, 2000.
    • (2000) Communications of the ACM , vol.43 , Issue.5 , pp. 51-58
    • Pottie, J.1    Kaiser, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.