Learn More
(2013). A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Abstract In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in(More)
Telecare medical information system (TMIS) constructs an efficient and convenient connection between patients and the medical server. The patients can enjoy medical services through public networks, and hence the protection of patients’ privacy is very significant. Very recently, Wu et al. identified Jiang et al.’s authentication scheme had some security(More)
Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated(More)
User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to(More)
(2014). A robust smart card-based anonymous user authentication protocol for wireless communications. Abstract Anonymous user authentication is an important but challenging task for wireless communications. In a recent paper, Das proposed a smart card-based anonymous user authentication protocol for wireless communications. The scheme can protect user(More)
In 2014, Arshad and Nikooghadam proposed an authentication and key agreement scheme for SIP to conquer the existing defects in Irshad et al.’s scheme. They claimed that their scheme resists various security attacks and has low computation cost. We found that even though Arshad et al.’s scheme achieves high efficiency, their scheme is insecure against server(More)
Tweakable blockciphers are blockciphers with an additional input, the tweak, that is used to provide variation, but is not kept secret. An open problem proposed by Liskov et al.is how to construct tweakable blockciphers without using a preexisting blockcipher. In this paper, on the basis of four round Dual MISTY-TYPE transformations, we propose a tweakable(More)
In this paper, we cryptanalyze Kim et al.'s scheme and point out several weaknesses in their scheme. Off-line password guessing/dictionary attack could be effective. Moreover, we demonstrate that there is a mistake in their security analysis. To remedy the weaknesses, we propose a more secure, robust and practical scheme, which is designed for portable(More)