Please use this identifier to cite or link to this item: https://idr.l4.nitk.ac.in/jspui/handle/123456789/9706
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMadhusudhan, R.
dc.contributor.authorNayak, C.S.
dc.date.accessioned2020-03-31T06:51:19Z-
dc.date.available2020-03-31T06:51:19Z-
dc.date.issued2019
dc.identifier.citationMultimedia Tools and Applications, 2019, Vol.78, 11, pp.15255-15273en_US
dc.identifier.uri10.1007/s11042-018-6884-6
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/9706-
dc.description.abstractWith the speedy progress in technology, the Internet has become a non-separable part of human life. It is obvious to use the Internet in all fields and medical field is no exception. The concept of establishing telecare medicine information systems(TMIS) for patients is gaining more popularity recently. To ensure the privacy of patients and to allow authorized access to remote medical servers, many authentication schemes have been proposed. Li et al., in 2016, proposed a secure dynamic identity and chaotic maps based user authentication and key agreement scheme. They claimed that the scheme is resistant to most of the known attacks. However, from thorough cryptanalysis, we have proved that their scheme is vulnerable to user impersonation attack, password guessing attack and server impersonation attack. We have also illustrated that their scheme does not provide user anonymity, convenient smart card revocation and security to session key. To overcome the aforementioned security weaknesses, we have proposed an enhanced authentication scheme using chaotic maps, which has been discussed in this paper along with its cryptanalysis. Cryptanalysis of the proposed scheme proves that the scheme is more robust and suitable for implementation. 2018, Springer Science+Business Media, LLC, part of Springer Nature.en_US
dc.titleA robust authentication scheme for telecare medical information systemsen_US
dc.typeArticleen_US
Appears in Collections:1. Journal Articles

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.