A construction of a conformal Chebyshev chaotic map based authentication protocol for healthcare telemedicine services
Tóm tắt
Từ khóa
Tài liệu tham khảo
Li X, Wu F, Khan MK, Xu L, Shen J, Jo M (2018) A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Fut Gen Comput Syst 840:149–159
Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. Int Conf Theory Appl Cryptogr Tech 00:523–540
Cao T, Zhai J (2013) Improved dynamic id-based authentication scheme for telecare medical information systems. J Med Syst 37(2):1–7
Chen HM, Lo JW, Yeh CK (2012) An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J Med Syst 36(6):3907–3915
Avoine Gildas Adversarial (2005) Model for radio frequency identification IACR cryptology. Arch Citeseer 1–49
Kocarev L, Lian S (2011) Chaos-based cryptography: theory, algorithms and applications. Springer, New York, pp 330–354
Lin HY (2013) On the security of a dynamic id-based authentication scheme for telecare medical information systems. J Med Syst 37(2):1–5
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory IEEE, pp 198–208
Wei J, Hu X, Liu W (2012) An improved authentication scheme for telecare medicine information systems. J Med Syst 36(6):3597–3604
Wu ZY, Lee YC, Lai F, Lee HC, Chung Y (2012) A secure authentication scheme for telecare medicine information systems. J Med Syst 36(3):1529–1535
Xie Q, Zhang J, Dong N (2013) Robust anonymous authentication scheme for telecare medical information systems. J Med Syst 37(2):1–8
Zhu Z (2012) An efficient authentication scheme for telecare medicine information systems. J Med Syst 36(6):3833–3838
Jiang Q, Ma J, Ma Z, Li G (2013) A privacy enhanced authentication scheme for telecare medical information systems. J Med Syst 37(1):1–8
Guo C, Chang CC (2013) Chaotic maps-based password-authenticated key agreement using smart cards. Commun Nonlinear Sci Numer Simul 18(6):1433–1440
Hao X, Wang J, Yang Q, Yan X, Li P (2013) A chaotic map-based authentication scheme for telecare medicine information systems. J Med Syst 37(2):1–7
Jiang Q, Ma J, Lu X, Tian Y (2014) Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J Med Syst 38(2):1–8
Kohda T, Tsuneda A, Lawrance AJ (2000) Correlational properties of chebyshev chaotic sequences. J Time Ser Anal 21(2):181–191
Kohda T, Tsuneda A (1993) Pseudonoise sequences by chaotic nonlinear maps and their correlation properties. IEICE Trans Commun 76(8):855–862
Radhakrishnan N, Karuppiah M (2018) An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems. Inf Med Unlocked Year Elsevier, pp 1–38
Madhusudhan R, Nayak Chaitanya S (2018) A robust authentication scheme for telecare medical information systems. Multimed Tools Appl, Springer, New York, pp 1–19
Li C-T, Lee C-C, Weng C-Y, Chen S-J (2016) A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J Med Syst Springer, New York, pp 11–233
Liu Y, Xue K (2016) An improved secure and efficient password and chaos-based two-party key agreement protocol. Nonlinear Dyn Springer New York, pp 549–557
Li C-T, Lee C-C, Weng C-Y (2014) A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J Med Syst Springer, New York, pp 9–86
Lee TF (2013) An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J Med Syst 37(6):1–9
Zhang L, Zhu S, Tang S (2017) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J Biomed Health Inf IEEE, pp 465–475
Amin R, Biswas GP (2015) An improved rsa based user authentication and session key agreement protocol usable in tmis. J Med Syst Springer, New York, pp 8–87
Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond A Math Phys Sci 426(1871):233–271
Jiang Q, Chen Z, Li B, Shen J, Yang L, Ma J (2018) Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J Ambient Intell Hum Comput Springer, New York, pp 1061–1073
Wu F, Xu L, Kumari S, Li X, Das AK, Shen J (2018) A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J Ambient Intell Hum Comput Springer, New York, pp 919–930
Xu X, Zhu P, Wen Q, Jin Z, Zhang H, He L (2014) A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J Med Syst 38(1):1–7
Wu F, Xu L (2013) Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J Med Syst 37(4):1–9
Lee TF, Chang IP, Lin TH, Wang CC (2013) A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J Med Syst 37(3):1–7
Bergamo P, D’Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circ Syst 52(7):1382–1393
Dharminder D, Mishra D, Li X (2020) Construction of RSA-based authentication scheme in authorized access to healthcare services. J Med Syst 44(1):1–6
Dharminder D, Gupta (2019) Pratik security analysis and application of Chebyshev Chaotic map in the authentication protocols. Int J Comput Appl 0(0):1–9
Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuellar J, Drielsma PH, Heam P-C, Kouchnarenko O, Mantovani J (2005) The AVISPA tool for the automated validation of internet security protocols and applications. In: International conference on computer aided verification, pp 281–285
Song J, Zhong Q, Wang W, Su C, Tan Z (2020) FPDP: flexible privacy-preserving data publishing scheme for smart agriculture. IEEE Sens J
Wang W, Huang H, Zhang L, Su C (2020) Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer–Peer Netw Appl 00:1–13
Javed AR, Beg MO, Asim M, Baker T, Al-Bayatti A (2020) Hilal AlphaLogger: Detecting motion-based side-channel attack using smartphone keystrokes. J Ambient Intell Hum Comput 00:1–14
Javed AR, Sarwar MU, Beg MO, Asim M, Baker T, Tawfik H (2020) A collaborative healthcare framework for shared healthcare plan with ambient intelligence human-centric computing and information sciences. J Ambient Intell Hum Comput 101:1–21
Sarwar MU, Javed AR (2019) Collaborative health care plan through crowdsource data using ambient application. In: 22nd International multitopic conference (INMIC), pp 1–6