Journal ArticleDOI
Efficient end-to-end authentication protocol for wearable health monitoring systems☆
TLDR
Comprehensive security analysis is conducted to show that the proposed protocol fixes these flaws of Amin et al.About:
This article is published in Computers & Electrical Engineering.The article was published on 2017-04-07. It has received 125 citations till now. The article focuses on the topics: Authentication protocol & Challenge-Handshake Authentication Protocol.read more
Citations
More filters
Journal ArticleDOI
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems
TL;DR: An ECC-based secure three-factor authentication protocol with forward secrecy for WMSN is proposed, which utilizes a fuzzy commitment scheme to handle the biometric information and utilizes fuzzy verifier and honey_list techniques to solve the contradiction of local password verification and mobile device lost attack.
Journal ArticleDOI
Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks
TL;DR: Wang et al. as mentioned in this paper proposed a lightweight and reliable authentication protocol for WMSN, which is composed of cutting-edge blockchain technology and physically unclonable functions (PUFs), and a fuzzy extractor scheme is introduced to deal with biometric information.
Journal ArticleDOI
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
TL;DR: An improved 3FA scheme is presented and it is shown that the new scheme fulfills session key secrecy and mutual authentication using the formal verification tool ProVerif and is capable of withstanding various attacks, and provides desired security features.
Journal ArticleDOI
BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems
TL;DR: This paper proposes a blockchain-based multi-level location sharing scheme, i.e. BMPLS, that can be applied to realize privacy-preserving location sharing based on blockchains for telecare medical information systems.
Journal ArticleDOI
An elliptic curve cryptography based enhanced anonymous authentication protocol for wearable health monitoring systems
TL;DR: An enhanced lightweight ECC based end-to-end authentication protocol is proposed to overcome the security vulnerabilities of Li et al.
References
More filters
Journal ArticleDOI
A Survey on Wearable Sensor-Based Systems for Health Monitoring and Prognosis
TL;DR: A variety of system implementations are compared in an approach to identify the technological shortcomings of the current state-of-the-art in wearable biosensor solutions and evaluate the maturity level of the top current achievements in wearable health-monitoring systems.
Journal ArticleDOI
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
TL;DR: This paper constructs a special tree-based index structure and proposes a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents.
Book
Elementary number theory and its applications
TL;DR: In this article, the authors introduce the notion of linear constrains and apply them to the problem of computing the order of an integer and a primitive root for a given integer.
Journal ArticleDOI
Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement
TL;DR: This paper study and solve the problem of personalized multi-keyword ranked search over encrypted data (PRSE) while preserving privacy in cloud computing with the help of semantic ontology WordNet, and proposes two PRSE schemes for different search intentions.
Journal ArticleDOI
A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing
TL;DR: A unique watermark is directly embedded into the encrypted images by the cloud server before images are sent to the query user, and when image copy is found, the unlawful query user who distributed the image can be traced by the watermark extraction.