2010
DOI: 10.1007/s10916-010-9527-7
|View full text |Cite
|
Sign up to set email alerts
|

A Password-Based User Authentication Scheme for the Integrated EPR Information System

Abstract: With the rapid development of the Internet, digitization and electronic orientation are required in various applications of our daily life. For e-medicine, establishing Electronic patient records (EPRs) for all the patients has become the top issue during the last decade. Simultaneously, constructing an integrated EPR information system of all the patients is beneficial because it can provide medical institutions and the academia with most of the patients' information in details for them to make correct decisi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
16
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 37 publications
(16 citation statements)
references
References 23 publications
0
16
0
Order By: Relevance
“…In 2012, Wu et al [33] first presented an efficient user authentication technique for an integrated EPR information system. They used lightweight operations in their protocol including one-way hash operations and bitwise XOR operations in order to enhance efficiency.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In 2012, Wu et al [33] first presented an efficient user authentication technique for an integrated EPR information system. They used lightweight operations in their protocol including one-way hash operations and bitwise XOR operations in order to enhance efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…They used lightweight operations in their protocol including one-way hash operations and bitwise XOR operations in order to enhance efficiency. However, Lee et al [34] pointed out that Wu et al [33] overlooked the possibility of stolen smart card attack through power consumption analysis [35]. Lee et al [34] then suggested an improved version that addressed the issue of Wu et al’s [33] technique.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Most hospitals or medical institutes have well developed Electronic patient records (EPRs) for e-medicine during the last decade and the technology for EPRs remains as one of the most popular researches in e-medicine. The ultimate aim of EPRs is to allow the sharing of patients' medical histories scattered among medical institutions through the Internet [1]. However, data-sharing brings the problem of data being eavesdropped, stolen or destroyed.…”
Section: Introductionmentioning
confidence: 99%
“…In order to prevent illegal users from visiting the remote server, secure strategies over an insecure network are concerned. Several relevant user authentication schemes and secret-key distribution protocols have been proposed [7][8][9][10][11], in which the password-based authentication mechanism is employed mostly because of its efficiency [12][13][14]. Under such mechanism, each user is allowed to select personal password and keep in mind without any additional assistant device for further authentication processes.…”
Section: Introductionmentioning
confidence: 99%