Background: The US government has enacted the Health Insurance Portability and Accountability Act (HIPAA), in which patient control over electronic protected health information is a major issue of concern. The two main goals of the Act are the privacy and security regulations in the HIPAA and the availability and confidentiality of electronic protected health information. The most recent authenticated key-agreement schemes for HIPAA privacy/security have been developed using time-consuming modular exponential computations or scalar multiplications on elliptic curves to provide higher security. However, these authenticated key-agreement schemes either have a heavy computational cost or suffer from authorization problems. Methods: Recent stud...
Multi-server environment is the most common scenario for a large number of enterprise class applicat...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
Medical record's security attracts a lot of attention these days. Whatever the security of health ca...
Two-factor authentication is one of the widely used approaches to allow a user to keep a weak passwo...
Telecare Medicine Information Systems (TMIS) provides flexible and convenient e-health care. However...
[[abstract]]Mobile users can roam into foreign networks and transmit messages to foreign agents, and...
User anonymity is one of the key security features of an authenticated key agreement especially for ...
[[abstract]]A key agreement protocol is used to derive a shared secure session key by two or more pa...
A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in...
Chaotic maps have been applied in the design of authenticated key agreement protocols, which allow c...
The Health Insurance Portability and Accountability Act (HIPAA) has set privacy and security regulat...
Authentication is used to enfold the privacy of the patient to implement security onto the communica...
Recently, Lu et al. claimed that Xie et al.'s three-party password-authenticated key agreement proto...
Abstract—This paper presents a new type of chaotic encryption system based on combined chaotic mappi...
Recently, several key agreement protocols based on Chebyshev chaotic maps have been proposed in the ...
Multi-server environment is the most common scenario for a large number of enterprise class applicat...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
Medical record's security attracts a lot of attention these days. Whatever the security of health ca...
Two-factor authentication is one of the widely used approaches to allow a user to keep a weak passwo...
Telecare Medicine Information Systems (TMIS) provides flexible and convenient e-health care. However...
[[abstract]]Mobile users can roam into foreign networks and transmit messages to foreign agents, and...
User anonymity is one of the key security features of an authenticated key agreement especially for ...
[[abstract]]A key agreement protocol is used to derive a shared secure session key by two or more pa...
A chaotic map-based mutual authentication scheme with strong anonymity is proposed in this paper, in...
Chaotic maps have been applied in the design of authenticated key agreement protocols, which allow c...
The Health Insurance Portability and Accountability Act (HIPAA) has set privacy and security regulat...
Authentication is used to enfold the privacy of the patient to implement security onto the communica...
Recently, Lu et al. claimed that Xie et al.'s three-party password-authenticated key agreement proto...
Abstract—This paper presents a new type of chaotic encryption system based on combined chaotic mappi...
Recently, several key agreement protocols based on Chebyshev chaotic maps have been proposed in the ...
Multi-server environment is the most common scenario for a large number of enterprise class applicat...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
Medical record's security attracts a lot of attention these days. Whatever the security of health ca...