2017
DOI: 10.1007/s12652-017-0516-2
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
49
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 89 publications
(49 citation statements)
references
References 48 publications
0
49
0
Order By: Relevance
“…In order to address the security aspects under the above-mentioned application scenario, many authentication protocols are proposed [4][5][6][7]. In 2009, Das [8] proposed a two-factor user authentication protocol, which is claimed to have strong authentication and session key establishment and achieves efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…In order to address the security aspects under the above-mentioned application scenario, many authentication protocols are proposed [4][5][6][7]. In 2009, Das [8] proposed a two-factor user authentication protocol, which is claimed to have strong authentication and session key establishment and achieves efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, in [23] Section 4.2, we can see that even the adversary guesses the password and identity simultaneously and the whole attack can be finished within limited time. Therefore, the adversary can exhaust the password and identity space simultaneously, and many scholars follow this principle [2,[24][25][26][27].…”
Section: Adversary Modelmentioning
confidence: 99%
“…For this reason, many ABE schemes [9,10] with extended functionalities have been proposed. In addition, there are also various privacy-preserving authentication protocols, like two-factor authentication [11,12], three-factor authentication [13,14], end-to-end authentication [15], and so on. And some new works focus on practical application fields, such as smart metering [16], Internet of Things [17], and WBAN [18].…”
Section: Related Workmentioning
confidence: 99%