A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
- 20 January 2013
- journal article
- Published by Springer Science and Business Media LLC in Journal of Medical Systems
- Vol. 37 (2), 9919
- https://doi.org/10.1007/s10916-012-9919-y
Abstract
With the development of Internet, patients could enjoy health-care delivery services through telecare medicine information systems (TMIS) in their home. To control the access to remote medical servers' resources, many authentication schemes using smart cards have been proposed. However, the performance of these schemes is not satisfactory since modular exponential operations are used in these schemes. In the paper, we propose a chaotic map-based authentication scheme for telecare medicine information systems. The security and performance analysis shows our scheme is more suitable for TMIS.Keywords
This publication has 16 references indexed in Scilit:
- Chaotic maps-based password-authenticated key agreement using smart cardsCommunications in Nonlinear Science and Numerical Simulation, 2012
- Security improvement on an anonymous key agreement protocol based on chaotic mapsCommunications in Nonlinear Science and Numerical Simulation, 2012
- An Efficient Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 2012
- An Improved Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 2012
- An anonymous key agreement protocol based on chaotic mapsCommunications in Nonlinear Science and Numerical Simulation, 2011
- A More Secure Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 2011
- An improved key agreement protocol based on chaosCommunications in Nonlinear Science and Numerical Simulation, 2010
- A Secure Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 2010
- Guest Editorial Introduction to the Special Section on M-Health: Beyond Seamless Mobility and Global Wireless Health-Care ConnectivityIEEE Transactions on Information Technology in Biomedicine, 2004
- Examining smart-card security under the threat of power analysis attacksInternational Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2002