|
|
【答案】应助回帖
★ ★ ★ ★ ★ ★ ★ ★ ★ ★ 感谢参与,应助指数 +1 zhuhf: 金币+10, ★★★★★最佳答案 2016-09-23 14:56:03 lazy锦溪: LS-EPI+1 2016-09-23 18:02:50
Accession number:
20163302704787
Title: An improved password authentication scheme for telecare medical information systems based on chaotic maps with privacy protection
Authors: Sun, Yang1 Email author 17247613@qq.com
Author affiliation: 1 Software College, Shenyang Normal University, No.253, HuangHe Bei Street, HuangGu District, Shenyang; P.C 110034, China
Corresponding author: Sun, Yang (17247613@qq.com)
Source title: Journal of Information Hiding and Multimedia Signal Processing
Abbreviated source title: J. Inf. Hiding Multimedia Signal Proces.
Volume: 7
Issue: 5
Issue date: 2016
Publication year: 2016
Pages: 1006-1019
Language: English
ISSN: 20734212
E-ISSN: 20734239
Document type: Journal article (JA)
Publisher: Ubiquitous International
Abstract: Chaos theory has been widely studied and adapted in cryptography for achieving some security mechanisms, such as encryption/decryption, key agreement and hash function. In order to improve the scope of application, many recearchers consider that chaos theory should be used in telecare medicine platform. Telecare Medicine Information Systems (TMISs) is a new emerging thing which aims at constructing a communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Recently, Lu et al. proposed a secure smart card based authentication scheme for TMISs using enhanced chaotic maps. In this paper, we show that Lu et al. s scheme has still some weaknesses such as smartcard denial of access, using XOR operation in a wrong way and some other flaws. Then, we give an improved scheme to revise these flaws. Finally, BAN logic proof and efficiency comparison are provided to show that our scheme is secure and more practical for telemedical environments. © 2016, Ubiquitous International. All Rights Reserved.
Number of references: 22
Main heading: Medical information systems
Controlled terms: Authentication - Chaos theory - Chaotic systems - Cryptography - Hash functions - Information systems - Lyapunov methods - Medical computing - Network security - Smart cards
Uncontrolled terms: Authentication scheme - Chaotic map - Efficiency comparisons - Encryption/decryption - Password - Password authentication - Scope of application - Telecare
Classification code: 722.4 Digital Computers and Systems - 723 Computer Software, Data Handling and Applications - 723.5 Computer Applications - 903 Information Science - 961 Systems Science
Database: Compendex
Compilation and indexing terms, © 2016 Elsevier Inc. |
|