Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 3 de 3
Filtrar
Mais filtros








Base de dados
Intervalo de ano de publicação
1.
J Med Syst ; 40(11): 237, 2016 Nov.
Artigo em Inglês | MEDLINE | ID: mdl-27665111

RESUMO

Authentication and key agreement schemes play a very important role in enhancing the level of security of telecare medicine information systems (TMISs). Recently, Amin and Biswas demonstrated that the authentication scheme proposed by Giri et al. is vulnerable to off-line password guessing attacks and privileged insider attacks and also does not provide user anonymity. They also proposed an improved authentication scheme, claiming that it resists various security attacks. However, this paper demonstrates that Amin and Biswas's scheme is defenseless against off-line password guessing attacks and replay attacks and also does not provide perfect forward secrecy. This paper also shows that Giri et al.'s scheme not only suffers from the weaknesses pointed out by Amin and Biswas, but it also is vulnerable to replay attacks and does not provide perfect forward secrecy. Moreover, this paper proposes a novel authentication and key agreement scheme to overcome the mentioned weaknesses. Security and performance analyses show that the proposed scheme not only overcomes the mentioned security weaknesses, but also is more efficient than the previous schemes.


Assuntos
Segurança Computacional/instrumentação , Confidencialidade , Sistemas de Informação/instrumentação , Telemedicina/instrumentação , Humanos
2.
J Med Syst ; 39(8): 76, 2015 Aug.
Artigo em Inglês | MEDLINE | ID: mdl-26084586

RESUMO

Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.


Assuntos
Segurança Computacional/instrumentação , Sistemas de Informação/instrumentação , Telemedicina/instrumentação , Algoritmos , Confidencialidade , Humanos , Fatores de Tempo
3.
J Med Syst ; 38(12): 136, 2014 Dec.
Artigo em Inglês | MEDLINE | ID: mdl-25352490

RESUMO

Nowadays, with comprehensive employment of the internet, healthcare delivery services is provided remotely by telecare medicine information systems (TMISs). A secure mechanism for authentication and key agreement is one of the most important security requirements for TMISs. Recently, Tan proposed a user anonymity preserving three-factor authentication scheme for TMIS. The present paper shows that Tan's scheme is vulnerable to replay attacks and Denial-of-Service attacks. In order to overcome these security flaws, a new and efficient three-factor anonymous authentication and key agreement scheme for TMIS is proposed. Security and performance analysis shows superiority of the proposed scheme in comparison with previously proposed schemes that are related to security of TMISs.


Assuntos
Identificação Biométrica/normas , Segurança Computacional/normas , Confidencialidade/normas , Sistemas de Informação em Saúde/normas , Telemedicina/normas , Identificação Biométrica/métodos , Identificação Biométrica/tendências , Sistemas de Informação em Saúde/organização & administração , Sistemas de Informação em Saúde/tendências , Humanos , Internet/tendências , Telemedicina/métodos , Telemedicina/tendências
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA