An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
نویسندگان
چکیده
منابع مشابه
An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytim...
متن کاملRemote User Authentication Scheme with User Anonymity
This paper proposes a scheme allowing a user to log into the server with a dynamic pseudonym. No one can trace the specified user except the service provider, which protects the user privacy from outsiders in this way. Besides, the scheme provides the following merits: (1) no verification table; (2) mutual authentication; (3) low communication and computation cost; (4) free password change; (5)...
متن کاملPreserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
http://dx.doi.org/10.1016/j.ins.2015.03.070 0020-0255/ 2015 Elsevier Inc. All rights reserved. ⇑ Corresponding author at: Room 560, 2#, Chuangchunxinyuan, University, No. 5 Yiheyuan Road, Haidian District, Beijing 100871, China. Tel.: 1134 5776; fax: +86 010 6276 5808. E-mail addresses: [email protected] (D. Wang), [email protected] (N. Wang), [email protected] (P. Wang), qsihan@s...
متن کاملSecure Smart Card Based Password Authentication Scheme with User Anonymity
Recently, a smart card based authentication and key agreement scheme preserving the user anonymity was proposed by Wang, Juang and Lei, that is designed to provide users with secure activities in ubiquitous computing environments. The authors proved that their scheme delivers important security properties and functionalities, such as without maintaining password/verification tables, freedom on ...
متن کاملAn Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity
The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2017
ISSN: 1424-8220
DOI: 10.3390/s17071482