-
1
-
-
84860253312
-
Security and privacy issues in wireless sensor networks for healthcare applications
-
Al Ameen M., Liu, J., Kwak, K., Security and privacy issues in wireless sensor networks for healthcare applications, J Med Syst, (36)(2012, 93-101
-
(2012)
J Med Syst
, Issue.36
, pp. 93-101
-
-
Al Ameen, M.1
Liu, J.2
Kwak, K.3
-
2
-
-
43649095986
-
Entity identification algorithms for distributed measurement and control systems with asymmetry of computational power
-
Adamsk, T., Winiecki, W., Entity identification algorithms for distributed measurement and control systems with asymmetry of computational power, Prz Elektrotechniczn, (2008), No. 05
-
(2008)
Prz Elektrotechniczn
, Issue.5
-
-
Adamsk, T.1
Winiecki, W.2
-
3
-
-
84877087628
-
The authentication of the grid monitoring system for wireless sensor networks
-
Cheng, X. R., Li, M. X., The authentication of the grid monitoring system for wireless sensor networks, Prz Elektrotechniczn, (2013), No. 01a
-
(2013)
Prz Elektrotechniczn
, Issue.1 a
-
-
Cheng, X.R.1
Li, M.X.2
-
4
-
-
84870991656
-
Authentication protocol for software and hardware components in distributed electronic signature creation system
-
Pejaś, J., El Fray, I., Ruciński, A., Authentication protocol for software and hardware components in distributed electronic signature creation system, Prz Elektrotechniczn, (2012), No. 10b
-
(2012)
Prz Elektrotechniczn
-
-
Pejaś, J.1
El Fray, I.2
Ruciński, A.3
-
5
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L., Password authentication with insecure communication, Commun ACM, 24(1981), 28-30
-
(1981)
Commun ACM
, vol.24
, pp. 28-30
-
-
Lamport, L.1
-
6
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang, M. S., Li, L. H., A new remote user authentication scheme using smart cards, IEEE Trans. Consum. Electron, 46(2000), No. 1, 28-30
-
(2000)
IEEE Trans. Consum. Electron
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
7
-
-
4043122631
-
A dynamic id-based remote user authentication scheme
-
Das, M. L., Saxena, A., Gulati, V. P. A dynamic id-based remote user authentication scheme, IEEE T Consum Electr, 50(2004), No. 2, 629-631
-
(2004)
IEEE T Consum Electr
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
8
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
doi: 10. 1007/s10916-010-9614-9
-
Wu, Z. Y., Lee, Y. C., Lai, F., Lee H. C., Chung, Y., A secure authentication scheme for telecare medicine information systems, J. Med. Syst. doi: 10. 1007/s10916-010-9614-9, 2010.
-
(2010)
J. Med. Syst
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
9
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
doi: 10. 1007/s10916-011-9658-5
-
He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems, J. Med. Syst. doi: 10. 1007/s10916-011-9658-5, 2011
-
(2011)
J. Med. Syst
-
-
He, D.B.1
Chen, J.H.2
Zhang, R.3
-
10
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
doi: 10. 1007/s10916-012-9835-1
-
Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems, J. Med. Syst. doi: 10. 1007/s10916-012-9835-1, 2012
-
(2012)
J. Med. Syst
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
11
-
-
84867843422
-
An Efficient authentication scheme for telecare medicine information systems
-
doi:10. 1007/s10916-012-9856-9
-
Zhu, Z., An Efficient authentication scheme for telecare medicine information systems, J. Med. Syst. doi:10. 1007/s10916-012-9856-9, 2012
-
(2012)
J. Med. Syst
-
-
Zhu, Z.1
-
12
-
-
79952538982
-
Provably secure and efficient identification and key agreement protocol with user anonymity
-
doi:10. 1016/j. jcss. 2010. 07. 004
-
Wang, R.-C., Juang, W.-S., Lei, C.-L., Provably secure and efficient identification and key agreement protocol with user anonymity, J Comput Syst Sci, doi:10. 1016/j. jcss. 2010. 07. 004. 2010
-
(2010)
J Comput Syst Sci
-
-
Wang, R.-C.1
Juang, W.-S.2
Lei, C.-L.3
-
13
-
-
84873039261
-
Strong authentication scheme for telecare medicine information systems
-
Pu, Q., Wang, J., Zhao, R.-Y., Strong authentication scheme for telecare medicine information systems, J Med Syst, 36(2012), 2609-2619
-
(2012)
J Med Syst
, vol.36
, pp. 2609-2619
-
-
Pu, Q.1
Wang, J.2
Zhao, R.-Y.3
-
14
-
-
78751642788
-
Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme
-
Khan, M. K., et al., Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme, Comput. Commun. 34(2010), No. 3, 305-309
-
(2010)
Comput. Commun
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
-
15
-
-
84867867616
-
An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
-
DOI 10. 1007/s10916-012-9862-y
-
Chen, H.-M., Lo, J.-W., Yeh, C.-K., An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems, J Med Syst, DOI 10. 1007/s10916-012-9862-y
-
J Med Syst
-
-
Chen, H.-M.1
Lo, J.-W.2
Yeh, C.-K.3
-
16
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T. S., Dabbish, E. A., Sloan, R. H., Examining smart-card security under the threat of power analysis attacks, IEEE T Comput, (51)2002., No. 5, 541-552
-
(2002)
IEEE T Comput
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
17
-
-
84939573910
-
Differential power analysis, Advances in Cryptology-CRYPTO'99, Santa Barbara, California, USA, August 15-19, 1999
-
Springer, ISBN 3-540-66347-9
-
Kocher, P., Jaffe, J., Jun, B., Differential power analysis, Advances in Cryptology-CRYPTO'99, Santa Barbara, California, USA, August 15-19, 1999. Lecture Notes in Computer Science 1666, Springer, ISBN 3-540-66347-9, 388-397, 1999
-
(1999)
Lecture Notes in Computer Science 1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
18
-
-
76749125939
-
Differential power analysis resistant hardware implementation of the RSA cryptosystem
-
Bayam, K. A., Örs, B., Differential power analysis resistant hardware implementation of the RSA cryptosystem, Turk J Elec Eng & Comp Sci, (18)2010, No. 1, 129-140
-
(2010)
Turk J Elec Eng & Comp Sci
, vol.18
, Issue.1
, pp. 129-140
-
-
Bayam, K.A.1
Örs, B.2
-
19
-
-
77955710837
-
Provably secure randomized blind signature scheme based on bilinear pairing
-
Fan, Ch.-I. Sun, Huang, W. Z., Vincent, S.-M., Provably secure randomized blind signature scheme based on bilinear pairing, Comput Math Appl, 2010, No. 60, 285-293
-
(2010)
Comput Math Appl
, Issue.60
, pp. 285-293
-
-
Fan, C.1
Sun, I.2
Huang, W.Z.3
Vincent, S.-M.4
-
20
-
-
0348003132
-
The state of elliptic curve cryptography
-
Koblitz, N., Menezes, A. J., Vanstone, S. A., The state of elliptic curve cryptography, Design Code Cryptogr, (19)2000, No. 2-3, 173-193
-
(2000)
Design Code Cryptogr
, vol.19
, Issue.2-3
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.J.2
Vanstone, S.A.3
-
21
-
-
84856430473
-
Security improvement on an anonymous key agreement protocol based on chaotic maps
-
Xue, K. M., Hong, P. L., Security improvement on an anonymous key agreement protocol based on chaotic maps, Commun Nonlinear Sci Numer Simulat, 2012, No. 17, 2969-2977
-
(2012)
Commun Nonlinear Sci Numer Simulat
, Issue.17
, pp. 2969-2977
-
-
Xue, K.M.1
Hong, P.L.2
-
22
-
-
84944878354
-
-
CRC Press, USA
-
Menezes, A., Van Oorschot, P. C., Vanstone, S. Handbook of Applied Cryptography, CRC Press, USA, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.C.2
Vanstone, S.3
|