Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Medical Data Management: A Practical Guide
Medical Data Management: A Practical Guide
Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService
IEEE Transactions on Mobile Computing
A Common Information Exchange Model for Multiple C4I Architectures
UKSIM '10 Proceedings of the 2010 12th International Conference on Computer Modelling and Simulation
Toward publicly auditable secure cloud data storage services
IEEE Network: The Magazine of Global Internetworking
Qualified Analysis b/w ESB(s) Using Analytical Hierarchy Process (AHP) Method
ISMS '11 Proceedings of the 2011 Second International Conference on Intelligent Systems, Modelling and Simulation
Secure and Inclusive Authentication with a Talking Mobile One-Time-Password Client
IEEE Security and Privacy
OTP-Based Two-Factor Authentication Using Mobile Phones
ITNG '11 Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations
IEEE Transactions on Parallel and Distributed Systems
The Next Web Apps Architecture: Challenges for SaaS Vendors
IT Professional
Secure Device Pairing Based on a Visual Channel: Design and Usability Study
IEEE Transactions on Information Forensics and Security
Mobile one-time passwords: two-factor authentication using mobile phones
Security and Communication Networks
A biometric identity-based signcryption scheme
Future Generation Computer Systems
IEEE Security and Privacy
An Efficient Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
An Improved Authentication Scheme for Telecare Medicine Information Systems
Journal of Medical Systems
Journal of Medical Systems
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems
Journal of Medical Systems
An Authentication Scheme for Secure Access to Healthcare Services
Journal of Medical Systems
Hi-index | 0.00 |
The Telecare Medical Information System (TMIS) provides a set of different medical services to the patient and medical practitioner. The patients and medical practitioners can easily connect to the services remotely from their own premises. There are several studies carried out to enhance and authenticate smartcard-based remote user authentication protocols for TMIS system. In this article, we propose a set of enhanced and authentic Three Factor (3FA) remote user authentication protocols utilizing a smartphone capability over a dynamic Cloud Computing (CC) environment. A user can access the TMIS services presented in the form of CC services using his smart device e.g. smartphone. Our framework transforms a smartphone to act as a unique and only identity required to access the TMIS system remotely. Methods, Protocols and Authentication techniques are proposed followed by security analysis and a performance analysis with the two recent authentication protocols proposed for the healthcare TMIS system.