Managing Medical and Insurance Information Through a Smart-Card-Based Information System
Journal of Medical Systems
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of a flexible remote user authentication scheme using smart cards
ACM SIGOPS Operating Systems Review
A password authentication scheme over insecure networks
Journal of Computer and System Sciences
A new mutual authentication scheme based on nonce and smart cards
Computer Communications
An improved smart card based password authentication scheme with provable security
Computer Standards & Interfaces
A Cryptographic Key Management Solution for HIPAA Privacy/Security Regulations
IEEE Transactions on Information Technology in Biomedicine
New directions in cryptography
IEEE Transactions on Information Theory
A Secure Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Journal of Medical Systems
Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme
International Journal of Communication Systems
Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment
Wireless Personal Communications: An International Journal
An Authentication Scheme for Secure Access to Healthcare Services
Journal of Medical Systems
Journal of Medical Systems
A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
The Journal of Supercomputing
Journal of Medical Systems
Journal of Medical Systems
A Patient Privacy Protection Scheme for Medical Information System
Journal of Medical Systems
On the security of an authentication scheme for multi-server architecture
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.00 |
It is important to guarantee the privacy and the security of the users in the telecare medicine information system. Recently, Wu et al.'s proposed an authentication scheme for mobile devices in telecare medicine information system. They added the pre-computing idea within the communication process to avoid the time-consuming exponential computations. They also claimed their scheme can withstand various attacks. We will show that their scheme suffers from the impersonation attack to the insider's attack. In order to overcome the weaknesses, we propose an improved scheme to eliminate the weakness. Our scheme is not only more secure than Wu et al.'s scheme, but also has better performance. Then our scheme is more efficient and appropriate to collocating with low power mobile devices for the telecare medicine information system.