Learn More
The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient’s privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In(More)
Biometrics authenticated schemes using smart cards have attracted much attention in multi-server environments. Several schemes of this type where proposed in the past. However, many of them were found to have some design flaws. This paper concentrates on the security weaknesses of the three-factor authentication scheme by Mishra et al. After careful(More)
Most of smart card-based remote authentication schemes proposed didn 't protect the users' identities while authenticating the users, even though user anonymity is an important issue in many e-commerce applications. In 2004, Das et al. proposed a remote authentication scheme to authenticate users while preserving the users' anonymity. Their scheme adopted(More)
In this paper, the synchronization control of memristor-based recurrent neural networks with impulsive perturbations or boundary perturbations is studied. We find that the memristive connection weights have a certain relationship with the stability of the system. Some criteria are obtained to guarantee that memristive neural networks have strong noise(More)
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using(More)
Recently, Mun et al. analyzed Wu et al.’s authentication scheme and proposed a enhanced anonymous authentication scheme for roaming service in global mobility networks. However, through careful analysis, we find that Mun et al.’s scheme is vulnerable to impersonation attacks, off-line password guessing attacks and insider attacks, and cannot provide user(More)
The technology of information hiding has developed rapidly in recent years. The number of steganography software has reached more than 200 at present. This paper focuses on the steganography tools¿ algorithms. Based on the analyses of these algorithms, we partition these tools into five categories: (1). Spatial domain based steganography tools; (2).(More)
Fractional-order PID (FOPID) controller is a generalization of standard PID controller using fractional calculus. Compared to PID controller, the tuning of FOPID is more complex and remains a challenge problem. This paper focuses on the design of FOPID controller using chaotic ant swarm (CAS) optimization method. The tuning of FOPID controller is formulated(More)