Das et al., 2013 - Google Patents
An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information systemDas et al., 2013
- Document ID
- 12287140778342632211
- Author
- Das A
- Bruhadeshwar B
- Publication year
- Publication venue
- Journal of medical systems
External Links
Snippet
Abstract Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. 37: 9933]. In this paper, we show that though their scheme is efficient, their scheme still …
- 239000003814 drug 0 title abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Card specific authentication in transaction processing
- G06Q20/4097—Mutual authentication between card and transaction partners
- G06Q20/40975—Use of encryption for mutual authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Das et al. | An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system | |
Das et al. | A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care | |
Wazid et al. | Design of an efficient and provably secure anonymity preserving three‐factor user authentication and key agreement scheme for TMIS | |
Amin et al. | An improved rsa based user authentication and session key agreement protocol usable in tmis | |
Amin et al. | A secure three-factor user authentication and key agreement protocol for tmis with user anonymity | |
Das | A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks | |
Odelu et al. | A secure biometrics-based multi-server authentication protocol using smart cards | |
Amin et al. | A novel user authentication and key agreement protocol for accessing multi-medical server usable in tmis | |
Chaudhry et al. | An enhanced privacy preserving remote user authentication scheme with provable security | |
Das et al. | A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks | |
Jiang et al. | A privacy enhanced authentication scheme for telecare medical information systems | |
Mishra et al. | A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card | |
Amin et al. | Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment | |
Amin et al. | Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems | |
Mir et al. | A secure biometrics based authentication with key agreement scheme in telemedicine networks for e-health services | |
Wazid et al. | Provably secure biometric‐based user authentication and key agreement scheme in cloud computing | |
Maitra et al. | A robust ElGamal‐based password‐authentication protocol using smart card for client‐server communication | |
Mir et al. | A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems | |
Chikouche et al. | A privacy-preserving code-based authentication protocol for Internet of Things | |
Reddy et al. | An enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography | |
Srinivas et al. | Provably secure biometric based authentication and key agreement protocol for wireless sensor networks | |
Das et al. | An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function | |
Sharma et al. | Advanced lightweight multi-factor remote user authentication scheme for cloud-IoT applications | |
Das | A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system | |
Ali et al. | Three-factor-based confidentiality-preserving remote user authentication scheme in multi-server environment |