Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Khan, S. Kumari, M. Gupta (2014)
More efficient key-hash based fingerprint remote authentication scheme using mobile deviceComputing, 96
Lili Xu, Fan Wu (2015)
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymitySecur. Commun. Networks, 8
D Wang, P Wang, D He (2014)
Anonymous two-factor authentication: Certain goals are beyond attainmentIEEE Trans. Dependable Secure Comput
Qianna Xie, Jun Zhang, Na Dong (2013)
Robust Anonymous Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 37
L. Nanni, A. Lumini (2008)
Random subspace for an improved BioHashing for face authenticationPattern Recognit. Lett., 29
Fengtong Wen (2013)
A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health CareJournal of Medical Systems, 37
Tianjie Cao, Jingxuan Zhai (2013)
Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 37
S. Kumari, M. Gupta, M. Khan, Xiong Li (2014)
An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvementSecur. Commun. Networks, 7
Hamed Arshad, M. Nikooghadam (2014)
Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 38
Xuelei Li, Q. Wen, Wenmin Li, Hua Zhang, Zhengping Jin (2014)
Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 38
M. Khan, S. Kumari (2013)
An Improved Biometrics-Based Remote User Authentication Scheme with User AnonymityBioMed Research International, 2013
P. Kocher, J. Jaffe, Benjamin Jun (1999)
Differential Power Analysis
M. Khan, S. Kumari (2014)
An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor NetworksInternational Journal of Distributed Sensor Networks, 10
Hung-Ming Chen, Jung-Wen Lo, Chang-Kuo Yeh (2012)
An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 36
S. Kumari, M. Khan, Xiong Li (2014)
An improved remote user authentication scheme with key agreementComput. Electr. Eng., 40
Qianna Xie, Wenhao Liu, Shengbao Wang, Lidong Han, B. Hu, Ting Wu (2014)
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health CareJournal of Medical Systems, 38
S. Kumari, M. Khan (2014)
Cryptanalysis and improvement of ‘a robust smart‐card‐based remote user password authentication scheme’International Journal of Communication Systems, 27
M. Khan, S. Kumari (2012)
An Authentication Scheme for Secure Access to Healthcare ServicesJournal of Medical Systems, 37
Chun-I Fan, Yi-Hui Lin (2009)
Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on BiometricsIEEE Transactions on Information Forensics and Security, 4
S. Kumari, M. Khan, Xiong Li, Fan Wu (2016)
Design of a user anonymous password authentication scheme without smart cardInternational Journal of Communication Systems, 29
S. Kumari, M. Khan (2014)
More secure smart card-based remote user password authentication scheme with user anonymitySecur. Commun. Networks, 7
Fengtong Wen, Dianli Guo (2014)
An Improved Anonymous Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 38
Han-Yu Lin (2013)
On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 37
S. Kumari, M. Khan, Rahul Kumar (2012)
Cryptanalysis and Improvement of ‘A Privacy Enhanced Scheme for Telecare Medical Information Systems’Journal of Medical Systems, 37
Qi Jiang, Jianfeng Ma, Zhuo Ma, Guangsong Li (2013)
A Privacy Enhanced Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 37
Fan Wu, Lili Xu (2015)
An improved and provable self‐certified digital signature scheme with message recoveryInternational Journal of Communication Systems, 28
A. Teoh, D. Ngo, A. Goh (2004)
Biohashing: two factor authentication featuring fingerprint data and tokenised random numberPattern Recognit., 37
Zuowen Tan (2014)
A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 38
Ding Wang, Ping Wang, D. He (2014)
Anonymous Two-Factor Authentication: Certain Goals Are Beyond AttainmentIACR Cryptol. ePrint Arch., 2014
M. Khan, S. Kumari (2014)
Cryptanalysis and Improvement of "An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems"Secur. Commun. Networks, 7
Kee-Won Kim, Jae-dong Lee (2014)
On the Security of Two Remote User Authentication Schemes for Telecare Medical Information SystemsJournal of Medical Systems, 38
J. Cheon, Pierre-Alain Fouque, Changmin Lee, Brice Minaud, Hansol Ryu (2014)
Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment.IACR Cryptology ePrint Archive, 2014
A. Das, A. Goswami (2013)
A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health CareJournal of Medical Systems, 37
Fan Wu, Lili Xu (2012)
Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 37
(2015)
J Med Syst
Ding Wang, D. He, Ping Wang, C. Chu (2015)
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond AttainmentIEEE Transactions on Dependable and Secure Computing, 12
T. Messerges, E. Dabbish, R. Sloan (2002)
Examining Smart-Card Security under the Threat of Power Analysis AttacksIEEE Trans. Computers, 51
Nowadays, connected health care applications are used more and more in the world. Service through the applications can save the patients’ time and expense, such as telecare medical information system (TMIS) and integrated electronic patient record (EPR) information system. In the applications, preserving patients’ privacy, transmitting messages securely and keeping mutual authentication should all be paid attention. Many authentication schemes have been proposed to make a secure communicating environment. Recently Xie et al. showed that Wen’s scheme was insecure because it was under the off-line password guessing attack and without user anonymity and forward security. They gave a new three-factor authentication scheme and claimed that it was secure. However, we find that Xie et al’s scheme is vulnerable to the De-synchronization attack and the server has too much storage burden in the scheme. Then we present an improved scheme which overcomes the usual weaknesses and keeps ordinary security characters. Compared with recent schemes of the same kind, our scheme is secure and practical.
Journal of Medical Systems – Springer Journals
Published: Jan 29, 2015
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.