With the existing anonymous authentication schemes based on biometrics, the user and the server can create the same session key after mutual authentication. If the anonymous authentication scheme is applied in the ele...
详细信息
With the existing anonymous authentication schemes based on biometrics, the user and the server can create the same session key after mutual authentication. If the anonymous authentication scheme is applied in the electronic medical environment, it is also necessary to consider that the patient may access multiple hospital servers. Based on three factors of smart card, random number and biometrics, an anonymous authentication scheme in the electronic medical environment is proposed. In order to reduce the burden of the medical registration and certification center(HC), in the proposed anonymous authentication scheme, the patient only needs to register with HC once, then he/she can apply for visiting each hospital that has joined the medical servers. Security analysis shows that the proposed scheme has anonymity and dual authentication, and can resist various types of attacks, such as insider attack, modification attack, replay attack and smart card loss attack. Efficiency analysis shows that the calculation cost of the proposed scheme in the registration and login phase is lower, and it is slightly higher than Lei's scheme and Khan et al's scheme in the authentication phase. The proposed scheme can not only resist various types of attacks, but also support dual authentication and multi-server environment. With a little modification, the proposed scheme can also be used to other application scenarios requiring anonymous authentication.
That vehicles travel on a curve with excessive speed tends to skid or roll over. This study presents research in video recognition technology of lane and its application in traffic early safety alert system, which imp...
详细信息
This system was made due to frequent errors in performing calculation of goods manufactured manually. The issues can be solved by using a TCS3200 sensor that can identifies the color of goods based on the color that h...
详细信息
Wireless sensor network (WSN) applications are added day by day owing to numerous global uses (by the military, for monitoring the atmosphere, in disaster relief, and so on). Here, trust management is a main challenge...
详细信息
Stemming is the process of deciphering words by carrying out affixes to words to get the right base words. In its development stemming has been developed for various languages, including Porter Stemmer. In this study,...
详细信息
Currently, Transformer-based prohibited object detection methods in X-ray images appear constantly, but there are still some shortcomings such as poor performance and high computational complexity for prohibited objec...
详细信息
Transformer is widely used in Natural Language Processing (NLP), in which numerous papers have been proposed. Recently, the transformer has been borrowed for many computer vision tasks. However, there are few papers t...
详细信息
This paper presents a new method for establishing the series and parallel resistors for the one-diode model of a PV panel. The proposed method uses only the PV panel data that are provided by the manufacturer to train...
详细信息
From the perspective of the Industry 4.0 paradigm, the machine learning (ML) discipline has had a significant influence on the manufacturing sector. The industry 4.0 concept promotes intelligent sensors, gadgets, and ...
详细信息
暂无评论