Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Khan, Soo-kyun Kim, K. Alghathbar (2011)
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'Comput. Commun., 34
Kuo-Hui Yeh, Chunhua Su, N. Lo, Yingjiu Li, Yi-Xiang Hung (2010)
Two robust remote user authentication protocols using smart cardsJ. Syst. Softw., 83
(2012)
A More Secure Authentication Scheme for Telecare Medicine Information Systems
Z. Wu, Yu-Fang Chung, F. Lai, Tzer-Shyong Chen (2012)
A Password-Based User Authentication Scheme for the Integrated EPR Information SystemJournal of Medical Systems, 36
Martín Abadi, C. Fournet (2001)
Mobile values, new names, and secure communication
Zhian Zhu (2012)
An Efficient Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 36
Z. Wu, Yueh-Chun Lee, F. Lai, Hung-Chang Lee, Yu-Fang Chung (2012)
A Secure Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 36
Che-Ming Yang, Herng‐Ching Lin, P. Chang, W. Jian (2006)
Taiwan's perspective on electronic medical records' security and privacy protection: Lessons learned from HIPAAComputer methods and programs in biomedicine, 82 3
M. Das, A. Saxena, V. Gulati (2004)
A dynamic ID-based remote user authentication schemeIEEE Transactions on Consumer Electronics, 50
Tien-Ho Chen, Han-Cheng Hsiang, W. Shih (2011)
Security enhancement on an improvement on two remote user authentication schemes using smart cardsFuture Gener. Comput. Syst., 27
P. Kocher, J. Jaffe, Benjamin Jun (1999)
Differential Power Analysis
Marko Hölbl, T. Welzer, B. Brumen (2009)
Attacks and Improvement of an Efficient Remote Mutual Authentication and Key Agreement SchemeCryptologia, 34
N. Lee, Jung-Chic Chen (2005)
Improvement of One-Time Password Authentication Scheme Using Smart CardsIEICE Trans. Commun., 88-B
Hung-Ming Chen, Jung-Wen Lo, Chang-Kuo Yeh (2012)
An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 36
M. Abadi, B. Blanchet, Hubert Comon-Lundh (2009)
Models and Proofs of Protocol Security: A Progress Report
Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, M. Khan (2007)
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cardsComput. Stand. Interfaces, 29
C. Hankin, David Schmidt (2001)
Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
C. Lambrinoudakis, S. Gritzalis (2000)
Managing Medical and Insurance Information Through a Smart-Card-Based Information SystemJournal of Medical Systems, 24
Q. Pu, Jian Wang, Rongyong Zhao (2011)
Strong Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 36
Qianna Xie (2012)
Improvement of a security enhanced one-time two-factor authentication and key agreement schemeSci. Iran., 19
Jianghong Wei, Xuexian Hu, Wenfen Liu (2012)
An Improved Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 36
Ren-Chiun Wang, Wen-Shenq Juang, C. Lei (2011)
Provably secure and efficient identification and key agreement protocol with user anonymityJ. Comput. Syst. Sci., 77
M. Witteman (2002)
Advances in Smartcard Security
Chun-Ta Li, M. Hwang, Y. Chu (2008)
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networksComput. Commun., 31
Hui Chen, Yang Xiao, X. Hong, Fei Hu, Jiang Xie (2009)
A survey of anonymity in wireless communication systemsSecur. Commun. Networks, 2
Wei-Bin Lee, Chien-Ding Lee (2008)
A Cryptographic Key Management Solution for HIPAA Privacy/Security RegulationsIEEE Transactions on Information Technology in Biomedicine, 12
(2013)
J Med Syst
Debiao He, Jianhua Chen, Rui Zhang (2012)
A More Secure Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 36
T. Messerges, E. Dabbish, R. Sloan (2002)
Examining Smart-Card Security under the Threat of Power Analysis AttacksIEEE Trans. Computers, 51
Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient’s privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.’s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.’s scheme also has some weaknesses. In particular, Chen et al.’s scheme does not provide user’s privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user’s smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.
Journal of Medical Systems – Springer Journals
Published: Jan 16, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.