The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online healthcare system provides healthcare services remotely to the patient which include telecare medicine system, patient monitoring system, patient healthcare system etc. Authentication schemes plays a significant and crucial role in providing legitimacy of patient and protection to medical resources/services. New trends in cryptography make the online healthcare services feasible solution to...
Interconnected computer systems and services using networks have improved the dependence on the stored accumulated data. Interconnected systems via network, in turn, could expedite security attacks. Recently, network security and cryptography techniques have evolved, leading to the advancement of biometric-based smart cards technique to implement the security of networks. In this paper, we demonstrated...
Smart card is widely accepted device which is used as a second authenticating factor in remote user authentication schemes. Kim-Chung proposed a remote user authentication scheme and they claimed that their scheme resists various security problems which were present in previous schemes such as offline leakage of password, stolen verifier attack, chances of masquerading the entities of the scheme....
In this world of e-technology, two users/systems requires to authenticate each other before exchanging the information. For this, there are numerous schemes proposed and analyzed for authentication. Indeed, in 2013, Chang et al.'s proposed an efficient untraceable dynamic identity system based on remote user authentication and claimed that the scheme is secure against various attack. In opposition,...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number in plaintext to verify the genuineness of the authentication server (AS), resulting in the leakage of some sensitive information and being attacked. Therefore, in this paper, to prevent the leakage of card number we propose a novel symmetric authentication scheme in which the card number is powered...
Smart card is a widely accepted user authentication tool to ensure only authorized access to resources available via open networks. In 2010, Sood et al. and Song independently examined a smart card based authentication scheme proposed by Xu et al. They showed that in Xu et al.'s scheme an internal user of the system could turn hostile to impersonate other users of the system. Sood et al. and Song...
In the present Internet age, one of the main challenging tasks is to provide confidentiality for user's transaction. Various authentication schemes have been proposed to secure the data from unauthorized users. One of the most prominent schemes is password based smart card authentication scheme used to withstand the possible attacks for verification table. However, most of these schemes are vulnerable...
With the popularity of Internet technology, remote user authentication is receiving more and more attention than before. Recently, Awasthi et al. analysed weakness of the timestamp-based authentication scheme proposed by Shen et al. and proposed an improved scheme to prevent its forgery attacks. They claimed that their scheme is secure against forged login attack, provides forward secrecy, and has...
User authentication plays an important role to ensure that only authorized users can access resources. Kim et al. proposed a remote user authentication scheme based on the Rabin cryptosystem to resist well-known attack such as offline password guessing attack, unlimited online password guessing attack and server impersonation. In their scheme, a user will be issued a smart card for authentication,...
Smart cards have been used in a wide variety of vertical markets delivering security services related to physical access control, user authentication and high value data transactions. However, their adoption in plug-n-play removable data storage markets is generally hindered by their dependence on external smart card reader hardware, their proprietary communication protocol that requires installation...
The two-factor authentication scheme combined password with smart card is one of the most widely used methods. This paper analyzes the security performance of a latest proposed remote user authentication scheme and simulates the attacks it suffers: it's vulnerability to the password guessing attack, the server masquerade attack and lacks of password backward security. Based on the detailed security...
Identity authentication is an important component of network security to guarantee the security of the information and service on open network. In this paper, we propose a secure “strong two-factor identity authentication” which stores digital certificate in smart card, and then protects the PIN of smart card with fuzzy fingerprint vault. Only the legal user can release the securely stored PIN to...
Authentication schemes play vital roles in computer and communication security. In order to authenticate the remote users, password based schemes have been widely used. In this paper we introduce a secure remote user authentication scheme based on bilinear pairing that satisfies all security requirements which are mentioned for password based authentication schemes using smart card.
Recently, Wang et al. showed that Das et al.'s dynamic ID-based remote user authentication scheme is vulnerable to an impersonation attack and can not achieve mutual authentication. Consequently, a more efficient and secure dynamic ID-based remote user authentication scheme was proposed and claimed that it was now secure and of practical value. However, in this paper, we will show that Wang et al...
To the best of our knowledge, all most previously proposed schemes based on smart cards which have the tamper resistance assumption for the smart card. However, many researches have shown that the secrets stored in a smart card can be breaches by analyzing the leaked information or monitoring the power consumption. This article will propose a new mutual authentication scheme based on nonce and smart...
Remote user authentication is used to validate the legitimacy of a remote log-in user. Due to the rapid growth of computer community, many network architectures are becoming multi-server based. Recently, there have been many remote password authentication schemes proposed for securing multi-server environments. These schemes used either a nonce or a timestamp technique to prevent the replay attack...
Hardware smart tokens are gaining popularity in strong online remote authentication. Das introduced a dynamic ID-based remote user authentication scheme with one-way hash function using the smart card. Lee, Hwang, Jian and others made alternative dynamic ID-based authentication schemes with smart card. This paper proposes an improved dynamic ID-based authentication scheme based on Jian's scheme by...
Recently, Wang et al. proposed a dynamic ID-based remote user authentication scheme using smart cards. They claimed that their scheme preserves anonymity of a user, has the features of strong password chosen by the server, and protected from several attacks. However, in this paper, we point out that Wang et al.'s scheme has practical pitfalls and is not feasible for real-life implementation. We identify...
Remote user authentication scheme is a mechanism which allows a server to authenticate a remote user over insecure channel. Recently, Goriparthi et al. made an enhancement based on Das et al.'s remote user authentication scheme using bilinear pairings. The scheme has the merits of no verification table, freely changing password and preventing the forgery attack and the replay attack. This paper, however,...
Personal health records (PHRs) offer significant potential to stimulate transformational changes in health care delivery and self-care by patients. There is a gap between today's personal health records (PHRs) and what patients say they want and need from this electronic tool for managing their health information. Current barriers to PHR adoption among patients include cost, concerns that information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.