Telecare medical information systems (TMIS), with the explosive growth of communication technology and physiological monitoring devices, are applied increasingly to enable and support healthcare delivery services. In order to safeguard patients' privacy and tackle the illegal access, authentication schemes for TMIS have been investigated and designed by many researchers. Many of them are promising for adoption in practice, nevertheless, they still have security flaws. In this paper, we propose a novel remote authentication scheme for TMIS using self-certified public keys, which is formally secure in the ID-mBJM model. Besides, the proposed scheme has better computational efficiency. Compared to the related schemes, our protocol is more practical for telemedicine system.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1007/s10916-015-0245-z | DOI Listing |
Sensors (Basel)
January 2025
School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea.
The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers.
View Article and Find Full Text PDFPLoS One
January 2025
Taiyuan University, Taiyuan, China.
Internal auditing demands innovative and secure solutions in today's business environment, with increasing competitive pressure and frequent occurrences of risky and illegal behaviours. Blockchain along with secure databases like encryption improves internal audit security through immutability and transparency. Hence integrating blockchain with homomorphic encryption and multi-factor authentication improves privacy and mitigates computational overhead.
View Article and Find Full Text PDFBiomed Eng Lett
January 2025
Department of Electronic Engineering, Hanyang University, Seoul, 04763 Republic of Korea.
Demand for user authentication in virtual reality (VR) applications is increasing such as in-app payments, password manager, and access to private data. Traditionally, hand controllers have been widely used for the user authentication in VR environment, with which the users can typewrite a password or draw a pre-registered pattern; however, the conventional approaches are generally inconvenient and time-consuming. In this study, we proposed a new user authentication method based on eye-writing patterns identified using electrooculogram (EOG) recorded from four locations around the eyes in contact with the face-pad of a VR headset.
View Article and Find Full Text PDFACS Appl Mater Interfaces
January 2025
Institute of Optoelectronic Technology, Fuzhou University, Fuzhou 350116, China.
Anticounterfeiting technologies meet challenges in the Internet of Things era due to the rapidly growing volume of objects, their frequent connection with humans, and the accelerated advance of counterfeiting/cracking techniques. Here, we, inspired by biological fingerprints, present a simple anticounterfeiting system based on perovskite quantum dot (PQD) fingerprint physical unclonable function (FPUF) by cooperatively utilizing the spontaneous-phase separation of polymers and selective in situ synthesis PQDs as an entropy source. The FPUFs offer red, green, and blue full-color fingerprint identifiers and random three-dimensional (3D) morphology, which extends binary to multivalued encoding by tuning the perovskite and polymer components, enabling a high encoding capacity (about 10, far surpassing that of biometric fingerprints).
View Article and Find Full Text PDFSensors (Basel)
December 2024
IMT Atlantique, Campus De Rennes 2 r Châtaigneraie, 35510 Cesson Sévigné, France.
The growing prevalence of cybersecurity threats is a significant concern for railway systems, which rely on an extensive network of onboard and trackside sensors. These threats have the potential to compromise the safety of railway operations and the integrity of the railway infrastructure itself. This paper aims to examine the current cybersecurity measures in use, identify the key vulnerabilities that they address, and propose solutions for enhancing the security of railway infrastructures.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!