An Improved Biometric-Based User Authentication Scheme for C/S System

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Biometric Based Authentication Scheme with User Anonymity Using Elliptic Curve Cryptosystem

Telecare medical information systems (TMIS) provides convenient health care services for patients in order to save the patients’ time and expense. The protection of user’s privacy and data security is significant over public communication. Recently, Lu et al. presented a threefactor based authentication protocol using elliptic curve cryptography. In this paper, we analyze the security of Lu et ...

متن کامل

An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key ag...

متن کامل

Robust biometric-based user authentication scheme for wireless sensor networks

Wireless sensor networks (WSNs) are applied widely a variety of areas such as realtime traffic monitoring, measurement of seismic activity, wildlife monitoring and so on. User authentication in WSNs is a critical security issue due to their unattended and hostile deployment in the field. In 2010, Yuan et al. proposed the first biometric-based user authentication scheme for WSNs. However, Yoon e...

متن کامل

An Improved Timestamp-Based Password Remote User Authentication Scheme

In 2003, Shen et al [4] proposed a timestamp-based password authentication scheme in which remote server does not need to store the passwords or verification table for users authentication. Unfortunately Wang and Li[6], E.J.Yoon [8], Lieu et al.[3], analyzed independently the Shen Lin Scheme [4] and was found to be vulnerable to some deadly attacks. In continuation to it, this paper analyzes fe...

متن کامل

A Robust Biometric-Based Three-factor Remote User Authentication Scheme

The rapid development of Internet of Things (IoT) technology, which is an inter connection of networks through an insecure public channel i.e. Internet demands for authenticating the remote user trying to access the secure network resources. In 2013, Ankita et al. proposed an improved three factor remote user authentication scheme. In this poster we will show that Ankita et al scheme is vulnera...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Distributed Sensor Networks

سال: 2014

ISSN: 1550-1477,1550-1477

DOI: 10.1155/2014/275341