An Improved Biometric-Based User Authentication Scheme for C/S System
نویسندگان
چکیده
منابع مشابه
An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem
Telecare medical information systems (TMIS) provides convenient health care services for patients in order to save the patients’ time and expense. The protection of user’s privacy and data security is significant over public communication. Recently, Lu et al. presented a threefactor based authentication protocol using elliptic curve cryptography. In this paper, we analyze the security of Lu et ...
متن کاملAn Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key ag...
متن کاملRobust biometric-based user authentication scheme for wireless sensor networks
Wireless sensor networks (WSNs) are applied widely a variety of areas such as realtime traffic monitoring, measurement of seismic activity, wildlife monitoring and so on. User authentication in WSNs is a critical security issue due to their unattended and hostile deployment in the field. In 2010, Yuan et al. proposed the first biometric-based user authentication scheme for WSNs. However, Yoon e...
متن کاملAn Improved Timestamp-Based Password Remote User Authentication Scheme
In 2003, Shen et al [4] proposed a timestamp-based password authentication scheme in which remote server does not need to store the passwords or verification table for users authentication. Unfortunately Wang and Li[6], E.J.Yoon [8], Lieu et al.[3], analyzed independently the Shen Lin Scheme [4] and was found to be vulnerable to some deadly attacks. In continuation to it, this paper analyzes fe...
متن کاملA Robust Biometric-Based Three-factor Remote User Authentication Scheme
The rapid development of Internet of Things (IoT) technology, which is an inter connection of networks through an insecure public channel i.e. Internet demands for authenticating the remote user trying to access the secure network resources. In 2013, Ankita et al. proposed an improved three factor remote user authentication scheme. In this poster we will show that Ankita et al scheme is vulnera...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Distributed Sensor Networks
سال: 2014
ISSN: 1550-1477,1550-1477
DOI: 10.1155/2014/275341