-
1
-
-
0033790614
-
Managing medical and insurance information through a smart-card-based information system
-
10.1023/A:1005549330655
-
Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213-234, 2000.
-
(2000)
J. Med. Syst.
, vol.24
, Issue.4
, pp. 213-234
-
-
Lambrinoudakis, C.1
Gritzalis, S.2
-
2
-
-
33744919262
-
Taiwan's perspective on electronic medical records' security and privacy protection: Lessons learned from HIPAA
-
10.1016/j.cmpb.2006.04.002
-
Yang, C. M., Lin, H. C., Chang, P., and Jian, W. S., Taiwan's perspective on electronic medical records' security and privacy protection: Lessons learned from HIPAA. Comput. Meth. Prog. Biol. 82(3):277-282, 2006.
-
(2006)
Comput. Meth. Prog. Biol.
, vol.82
, Issue.3
, pp. 277-282
-
-
Yang, C.M.1
Lin, H.C.2
Chang, P.3
Jian, W.S.4
-
3
-
-
39449106296
-
A cryptographic key management solution for HIPAA privacy/security regulations
-
10.1109/TITB.2007.906101
-
Lee, W. B., and Lee, C. D., A cryptographic key management solution for HIPAA privacy/security regulations. IEEE Trans. Inf. Technol. Biomed. 12(1):34-41, 2008.
-
(2008)
IEEE Trans. Inf. Technol. Biomed.
, vol.12
, Issue.1
, pp. 34-41
-
-
Lee, W.B.1
Lee, C.D.2
-
4
-
-
1942521604
-
Advances in smartcard security
-
Witteman, M., Advances in smartcard security. Inf. Secur. Bull. 7(2002):11-22, 2002.
-
(2002)
Inf. Secur. Bull.
, vol.7
, Issue.2002
, pp. 11-22
-
-
Witteman, M.1
-
5
-
-
26444435748
-
Improvement of one-time password authentication scheme using smart card
-
10.1093/ietcom/e88-b.9.3765
-
Lee, N. Y., and Chen, J. C., Improvement of one-time password authentication scheme using smart card. IEICE Trans. Commun. E88-B(9):3765-3769, 2005.
-
(2005)
IEICE Trans. Commun.
, vol.88
, Issue.9
, pp. 3765-3769
-
-
Lee, N.Y.1
Chen, J.C.2
-
6
-
-
72349099818
-
Attacks and improvement of an efficient remote mutual authentication and key agreement scheme
-
10.1080/01611190903030912
-
Hölbl, M., Welzer, T., and Brumen, B., Attacks and improvement of an efficient remote mutual authentication and key agreement scheme. Cryptologia 34(1):52-59, 2009.
-
(2009)
Cryptologia
, vol.34
, Issue.1
, pp. 52-59
-
-
Hölbl, M.1
Welzer, T.2
Brumen, B.3
-
7
-
-
78049322666
-
Two robust remote user authentication protocols using smart cards
-
10.1016/j.jss.2010.07.062
-
Yeh, K. H., Sub, C. H., Loa, N. W., Li, Y., and Hung, Y. X., Two robust remote user authentication protocols using smart cards. J. Syst. Softw. 83(12):2556-2565, 2010.
-
(2010)
J. Syst. Softw.
, vol.83
, Issue.12
, pp. 2556-2565
-
-
Yeh, K.H.1
Sub, C.H.2
Loa, N.W.3
Li, Y.4
Hung, Y.X.5
-
8
-
-
34248666700
-
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
-
10.1016/j.csi.2006.11.005
-
Wang, X. M., Zhang, W. F., Zhang, J. S., and Khan, M. K., Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. Comput. Stand. Interfac. 29(5):507-512, 2007.
-
(2007)
Comput. Stand. Interfac.
, vol.29
, Issue.5
, pp. 507-512
-
-
Wang, X.M.1
Zhang, W.F.2
Zhang, J.S.3
Khan, M.K.4
-
9
-
-
78049329614
-
Security enhancement on an improvement on two remote user authentication schemes using smart cards
-
1210.93039 10.1016/j.future.2010.08.007
-
Chen, T. H., Hsiang, H. C., and Shih, W. K., Security enhancement on an improvement on two remote user authentication schemes using smart cards. Futur. Gener. Comput. Syst. 27(4):377-380, 2011.
-
(2011)
Futur. Gener. Comput. Syst.
, vol.27
, Issue.4
, pp. 377-380
-
-
Chen, T.H.1
Hsiang, H.C.2
Shih, W.K.3
-
10
-
-
84871953187
-
Improvement of a security enhanced one-time two-factor authentication and key agreement scheme
-
doi: 10.1016/j.scient.2012.02.029.
-
Xie, Q., Improvement of a security enhanced one-time two-factor authentication and key agreement scheme. Sci. Iran., 2012. doi: 10.1016/j.scient.2012.02.029.
-
(2012)
Sci. Iran.
-
-
Xie, Q.1
-
11
-
-
84863200393
-
Password-based user authentication scheme for the integrated EPR information system
-
10.1007/s10916-010-9527-7
-
Wu, Z. Y., Chung, Y., Lai, F., and Chen, T. S., Password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36:631-638, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, pp. 631-638
-
-
Wu, Z.Y.1
Chung, Y.2
Lai, F.3
Chen, T.S.4
-
12
-
-
84864061174
-
A secure authentication scheme for Telecare Medicine Information Systems
-
10.1007/s10916-010-9614-9
-
Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for Telecare Medicine Information Systems. J. Med. Syst. 36:1529-1535, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, pp. 1529-1535
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
13
-
-
84864058187
-
A more secure authentication scheme for Telecare Medicine Information Systems
-
10.1007/s10916-011-9658-5
-
He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for Telecare Medicine Information Systems. J. Med. Syst. 36:1989-1995, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, pp. 1989-1995
-
-
He, D.B.1
Chen, J.H.2
Zhang, R.3
-
14
-
-
84867869987
-
An improved authentication scheme for Telecare Medicine Information Systems
-
doi: 10.1007/s10916-012-9835-1
-
Wei, J., Hu, X., and Liu, W., An improved authentication scheme for Telecare Medicine Information Systems. J. Med. Syst., 2012. doi: 10.1007/s10916-012-9835-1.
-
(2012)
J. Med. Syst.
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
15
-
-
84867843422
-
-
doi: 10.1007/s10916-012-9856-9
-
Zhu, Z., and, J. Med. Syst., 2012. doi: 10.1007/s10916-012-9856-9.
-
(2012)
J. Med. Syst.
-
-
Zhu, Z.1
-
16
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
10.1109/TCE.2004.1309441 508
-
Das, M. L., Saxena, A., and Gulati, V. P., A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electron. 50(2):629-631, 2004. 508.
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
17
-
-
84873039261
-
Strong authentication scheme for Telecare Medicine Information Systems
-
doi: 10.1007/s10916-011-9735-9
-
Pu, Q., Wang, J., and Zhao, R., Strong authentication scheme for Telecare Medicine Information Systems. J. Med. Syst., 2011. doi: 10.1007/s10916-011- 9735-9.
-
(2011)
J. Med. Syst.
-
-
Pu, Q.1
Wang, J.2
Zhao, R.3
-
18
-
-
79952538982
-
Provably secure and efficient identification and key agreement protocol with user anonymity
-
2799277 1210.68033 10.1016/j.jcss.2010.07.004
-
Wang, R. C., Juang, W. S., and Lei, C. L., Provably secure and efficient identification and key agreement protocol with user anonymity. J. Comput. Syst. Sci. 77(4):790-798, 2011.
-
(2011)
J. Comput. Syst. Sci.
, vol.77
, Issue.4
, pp. 790-798
-
-
Wang, R.C.1
Juang, W.S.2
Lei, C.L.3
-
19
-
-
84867867616
-
An efficient and secure dynamic ID-based authentication scheme for Telecare Medical Information Systems
-
doi: 10.1007/s10916-012-9862-y
-
Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic ID-based authentication scheme for Telecare Medical Information Systems. J. Med. Syst., 2012. doi: 10.1007/s10916-012-9862-y.
-
(2012)
J. Med. Syst.
-
-
Chen, H.M.1
Lo, J.W.2
Yeh, C.K.3
-
20
-
-
78751642788
-
Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme
-
10.1016/j.comcom.2010.02.011
-
Khan, M. K., Kim, K. S., and Alghathbar, K., Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme. Comput. Commun. 34(3):305-309, 2010.
-
(2010)
Comput. Commun.
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, K.S.2
Alghathbar, K.3
-
21
-
-
70350234578
-
A survey of anonymity in wireless communication systems
-
10.1002/sec.78
-
Chen, H., Xiao, Y., Hong, X., Hu, F., and Xie, J., A survey of anonymity in wireless communication systems. Secur. Comm. Netw. 2:427-444, 2009.
-
(2009)
Secur. Comm. Netw.
, vol.2
, pp. 427-444
-
-
Chen, H.1
Xiao, Y.2
Hong, X.3
Hu, F.4
Xie, J.5
-
22
-
-
84939573910
-
Differential power analysis
-
Kocher, P., Jaffe, J., and Jun, J., Differential power analysis. Proceedings of Advances in Cryptology (CRYPTO 99). pp.388-397, 1999.
-
(1999)
Proceedings of Advances in Cryptology (CRYPTO 99)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, J.3
-
23
-
-
0036566408
-
Examining smartcard security under the threat of power analysis attacks
-
1901004 10.1109/TC.2002.1004593
-
Messerges, T., Dabbish, E., and Sloan, R., Examining smartcard security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541-552, 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.1
Dabbish, E.2
Sloan, R.3
-
24
-
-
70350241650
-
Models and proofs of protocol security: A progress report
-
Grenoble, France
-
Abadi, M., Blanchet, B., and Lundh, H. C., Models and proofs of protocol security: A progress report. 21st International Conference on Computer Aided Verification, Grenoble, France, pp. 35-49, 2009.
-
(2009)
21st International Conference on Computer Aided Verification
, pp. 35-49
-
-
Abadi, M.1
Blanchet, B.2
Lundh, H.C.3
-
25
-
-
17644411480
-
Mobile values, new names, and secure communication
-
ACM New York
-
Abadi, M., and Fournet, C., Mobile values, new names, and secure communication. Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages. ACM New York, pp. 104-115, 2001.
-
(2001)
Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
26
-
-
46749099079
-
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
-
10.1016/j.comcom.2007.12.005
-
Li, C. T., Hwang, M. S., and Chu, Y. P., A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks. Comput. Commun. 31:2803-2814, 2008.
-
(2008)
Comput. Commun.
, vol.31
, pp. 2803-2814
-
-
Li, C.T.1
Hwang, M.S.2
Chu, Y.P.3
|