Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
Published 2015 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
Authors
Keywords
Authentication, Authenticated key agreement, Elliptic curve cryptography, Impersonation attack, TMIS, Body area networks
Journal
JOURNAL OF MEDICAL SYSTEMS
Volume 39, Issue 6, Pages -
Publisher
Springer Nature
Online
2015-04-25
DOI
10.1007/s10916-015-0244-0
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Comment on ‘Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications’
- (2015) Shehzad Ashraf Chaudhry IET Communications
- A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the Integrated EPR Information System
- (2015) Ashok Kumar Das JOURNAL OF MEDICAL SYSTEMS
- Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care
- (2015) Lili Xu et al. JOURNAL OF MEDICAL SYSTEMS
- An improved password-based authentication scheme for session initiation protocol using smart cards without verification table
- (2014) Mohammad Sabsinejad Farash INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem
- (2014) Zhenguo Zhao JOURNAL OF MEDICAL SYSTEMS
- A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare Medicine Information Systems
- (2014) Zhiheng Wang et al. JOURNAL OF MEDICAL SYSTEMS
- An Efficient and Robust RSA-Based Remote User Authentication for Telecare Medical Information Systems
- (2014) Debasis Giri et al. JOURNAL OF MEDICAL SYSTEMS
- Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems
- (2014) SK Hafizul Islam et al. JOURNAL OF MEDICAL SYSTEMS
- An efficient client–client password-based authentication scheme with provable security
- (2014) Mohammad Sabzinejad Farash et al. JOURNAL OF SUPERCOMPUTING
- A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
- (2014) Mohammad Sabzinejad Farash et al. JOURNAL OF SUPERCOMPUTING
- An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
- (2014) Shehzad Ashraf Ch et al. MULTIMEDIA TOOLS AND APPLICATIONS
- An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
- (2014) Mohammad Sabzinejad Farash et al. NONLINEAR DYNAMICS
- Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
- (2014) Mohammad Sabzinejad Farash Peer-to-Peer Networking and Applications
- An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system
- (2014) Haomiao Yang et al. Peer-to-Peer Networking and Applications
- Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks
- (2013) Jingwei Liu et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications
- (2013) Liping Zhang et al. IET Communications
- A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems
- (2013) Xin Xu et al. JOURNAL OF MEDICAL SYSTEMS
- Cryptanalysis and Improvement of ‘A Privacy Enhanced Scheme for Telecare Medical Information Systems’
- (2013) Saru Kumari et al. JOURNAL OF MEDICAL SYSTEMS
- A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems
- (2013) Qi Jiang et al. JOURNAL OF MEDICAL SYSTEMS
- Cryptanalysis and Improvement of “An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems”
- (2013) Muhammad Khurram Khan et al. Security and Communication Networks
- An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings
- (2012) Debiao He Ad Hoc Networks
- A new efficient authenticated multiple-key exchange protocol from bilinear pairings
- (2012) Mohammad Sabzinejad Farash et al. COMPUTERS & ELECTRICAL ENGINEERING
- An Efficient Authentication Scheme for Telecare Medicine Information Systems
- (2012) Zhian Zhu JOURNAL OF MEDICAL SYSTEMS
- An Improved Authentication Scheme for Telecare Medicine Information Systems
- (2012) Jianghong Wei et al. JOURNAL OF MEDICAL SYSTEMS
- An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
- (2012) Hung-Ming Chen et al. JOURNAL OF MEDICAL SYSTEMS
- An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
- (2011) He Debiao et al. Information Fusion
- An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System
- (2011) Shuhua Wu et al. JOURNAL OF MEDICAL SYSTEMS
- A More Secure Authentication Scheme for Telecare Medicine Information Systems
- (2011) He Debiao et al. JOURNAL OF MEDICAL SYSTEMS
- A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem
- (2011) SK Hafizul Islam et al. JOURNAL OF SYSTEMS AND SOFTWARE
- Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’
- (2010) Muhammad Khurram Khan et al. COMPUTER COMMUNICATIONS
- A Secure Authentication Scheme for Telecare Medicine Information Systems
- (2010) Zhen-Yu Wu et al. JOURNAL OF MEDICAL SYSTEMS
- A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves
- (2009) Yi-Pin Liao et al. COMPUTER COMMUNICATIONS
- On the security of a novel key agreement protocol based on chaotic maps
- (2008) Tao Xiang et al. CHAOS SOLITONS & FRACTALS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now