The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Chen et al. proposed in 2012, a dynamic ID-based authentication scheme for Telecare Medical Information Systems. Chen et al. preferred simpler computations unlike previous schemes proposed for TMIS, so they designed a computational complexity-free protocol. But it entails many security concerns. Here we show that an adversary can cheat the lawful participants of the scheme, can compute the agreed...
An architecture that differentiates security according to service-specific characteristics avoids an unnecessary drain on IT resources by protecting a variety of cloud computing services at just the right level.
In order to meet special requirements of VE's inter-enterprises authentication under different organization structures, a generalized VCA scheme based on variable privilege sets was proposed, in which the paritcipants' privilege sets were allocated flexibly according to VE's different organization structures, and by constructing corresponding variable multi-parties protocols for VCA's creation and...
Remote user authentication schemes are widely investigated recently. This paper points out some existent problems in smartcard based schemes. As a comprehensive solution, a novel authentication scheme using two-variant hashing technique and fingerprint-biometric is presented. Security analysis shows that the proposed scheme provides secure, robust, and trustworthy remote authentication over insecure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.