Learn More
Since the number of server providing the facilities for the user is usually more than one, the authentication protocols for multi-server environment are required for practical applications. Most of password authentication schemes for multi-server environment are based on static ID, so the adversary can use this information to trace and identify the user's(More)
The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients’ electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al.(More)
Secure verified-based three-party authentication scheme for data exchange in telecare medicine information systems enables two users only store their verifiers computed from their actual password in authentication server’s database. Then the authentication server can verify the users’ verifiers and help them to exchange electronic medical records or(More)
The mobile multimedia applications have recently generated much interest in wireless ad hoc networks with supporting the quality-of-service (QoS) communications. The QoS metric considered in this work is the reserved bandwidth, i.e., the time slot reservation. We approach this problem by assuming a common channel shared by all hosts under a TDMA (Time(More)
The problem for dynamic IP address assignment is manifest in mobile ad hoc networks (MANETs), especially in 4G all-IP-based heterogeneous networks. In this paper, we propose a ring-based address au-toconfiguration protocol to configure node addresses. This work aims at the decentralized ring-based address autoconfiguration (DRAA) protocol , which has the(More)
Increasingly, services operations which perform data sensing and data propagation in a dynamic environment are important tasks of wireless sensor networks. Therefore, increasing the network lifetime is the main contribution of this investigation. In this paper, we propose a novel power-aware chessboard-based adaptive routing (PCAR) protocol to support(More)
In this paper, we investigate a new efficient QoS routing protocol based on the time-slot leasing mechanism over Bluetooth WPANs. The ''transmission holding'' problem is incurred because the master node is the communication bottleneck for each slave-master-slave communication in Bluetooth. To alleviate this problem, a time-slot leasing scheme is adaptively(More)
Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize(More)
Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to remember.(More)