Learn More
(2013). A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Abstract In global mobility networks, anonymous user authentication is an essential task for enabling roaming service. In a recent paper, Jiang et al. proposed a smart card based anonymous user authentication scheme for roaming service in(More)
Telecare medical information system (TMIS) constructs an efficient and convenient connection between patients and the medical server. The patients can enjoy medical services through public networks, and hence the protection of patients’ privacy is very significant. Very recently, Wu et al. identified Jiang et al.’s authentication scheme had some security(More)
Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated(More)
(2014). A robust smart card-based anonymous user authentication protocol for wireless communications. Abstract Anonymous user authentication is an important but challenging task for wireless communications. In a recent paper, Das proposed a smart card-based anonymous user authentication protocol for wireless communications. The scheme can protect user(More)
User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In a recent paper, Das et al. proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. This scheme uses three factors, e.g. biometrics, password, and smart card, to(More)
In this paper, we cryptanalyze Kim et al.'s scheme and point out several weaknesses in their scheme. Off-line password guessing/dictionary attack could be effective. Moreover, we demonstrate that there is a mistake in their security analysis. To remedy the weaknesses, we propose a more secure, robust and practical scheme, which is designed for portable(More)
Tweakable blockciphers are blockciphers with an additional input, the tweak, that is used to provide variation, but is not kept secret. An open problem proposed by Liskov et al.is how to construct tweakable blockciphers without using a preexisting blockcipher. In this paper, on the basis of four round Dual MISTY-TYPE transformations, we propose a tweakable(More)
In a recent paper (AMIS, 6(2S), 2012), Lee proposed a dynamic ID-based user authentication scheme based on smart card which is believed to have many abilities to resist a range of network attacks. In this paper, we analyze the security of Lee's scheme and show that the scheme is in fact insecure against insider-assisted attack, even if the adversary doesn't(More)