-
1
-
-
0033790614
-
Managing medical and insurance information through a smart-card-based information system
-
Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213-234, 2000.
-
(2000)
J. Med. Syst.
, vol.24
, Issue.4
, pp. 213-234
-
-
Lambrinoudakis, C.1
Gritzalis, S.2
-
2
-
-
84867843422
-
An efficient authentication scheme for telecare medicine information systems
-
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833-3838, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3833-3838
-
-
Zhu, Z.1
-
3
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529-1535, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1529-1535
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
4
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989-1995, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.B.1
Chen, J.H.2
Zhang, R.3
-
5
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597-3604, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3597-3604
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
6
-
-
84874803351
-
A secure smart-card based authentication and key agreement scheme for telecare medicine information systems
-
Lee, T.-F., and Liu, C.-M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 37(3):9933, 2013. 1-8
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
-
-
Lee, T.-F.1
Liu, C.-M.2
-
7
-
-
84872265840
-
A chaotic map-based authentication scheme for telecare medicine information systems
-
Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaoticmap-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):9919, 2013. 1-7.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
-
-
Hao, X.1
Wang, J.2
Yang, Q.3
Yan, X.4
Li, P.5
-
8
-
-
84875510914
-
A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system
-
Lee, T.-F., Chang, I.-P., Lin, T.-H., and Wang, C.-C., A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system. J. Med. Syst. 37(3):9941, 2013. 1-7.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
-
-
Lee, T.-F.1
Chang, I.-P.2
Lin, T.-H.3
Wang, C.-C.4
-
9
-
-
84891599579
-
An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems
-
Lee, T.-F., An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J. Med. Syst. 37(6):9985, 2013. 1-9.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.6
-
-
Lee, T.-F.1
-
10
-
-
0345098454
-
Efficient three-party authentication and key agreement protocols resistant to password guessing attacks
-
Yeh, H.-T., Sun, H.-M., and Hwang, T., Efficient three-party authentication and key agreement protocols resistant to password guessing attacks. Inf. Sci. Eng. 19(6):1059-1070, 2003.
-
(2003)
Inf. Sci. Eng.
, vol.19
, Issue.6
, pp. 1059-1070
-
-
Yeh, H.-T.1
Sun, H.-M.2
Hwang, T.3
-
11
-
-
25144525619
-
Efficient verifier-based key agreement protocol for three parties without server's public key
-
DOI 10.1016/j.amc.2004.06.129, PII S0096300304005454
-
Lee, S.-W., Kim, H.-S., and Yoo, K.-Y., Efficient verifier-based key agreement protocol for three partieswithout server 's public key. Appl. Math. Comput. 167(2):996-1003, 2005. (Pubitemid 41344804)
-
(2005)
Applied Mathematics and Computation
, vol.167
, Issue.2
, pp. 996-1003
-
-
Lee, S.-W.1
Kim, H.-S.2
Yoo, K.-Y.3
-
12
-
-
67649791953
-
Communication-efficient three-party protocols for authentication and key agreement
-
Lee, T.-F., Liu, J. L., Sung, M.-J., Yang, S.-B., and Chen, C.-M., Communication-efficient three-party protocols for authentication and key agreement. Comput. Math. Appl. 58:641-648, 2009.
-
(2009)
Comput. Math. Appl.
, vol.58
, pp. 641-648
-
-
Lee, T.-F.1
Liu, J.L.2
Sung, M.-J.3
Yang, S.-B.4
Chen, C.-M.5
-
13
-
-
84899085062
-
Security enhancement on efficient verifier-based key agreement protocol for three parties without server's public key
-
Wang, R.-C., and Mo, K.-R., Security enhancement on efficient verifier-based key agreement protocol for three parties without server's public key. Int. Math. Forum 1(20):965-972, 2006.
-
(2006)
Int. Math. Forum
, vol.1
, Issue.20
, pp. 965-972
-
-
Wang, R.-C.1
Mo, K.-R.2
-
14
-
-
34248672528
-
Efficient verifier-based password-authenticated key exchange in the three-party setting
-
DOI 10.1016/j.csi.2006.12.002, PII S0920548906001395
-
Kwon, J.-O., Jeong, I.-R., Sakurai, K., and Lee, D.-H., Efficient verifier-based password-authenticated key exchange in the three-party setting. Comput. Stand. Interfaces 29(5): 513-520, 2007. (Pubitemid 46771127)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.5
, pp. 513-520
-
-
Kwon, J.O.1
Jeong, I.R.2
Sakurai, K.3
Lee, D.H.4
-
15
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., and Hellman, M., New directions in cryptography. IEEE Trans. Inf. Theory 22(6):644-654, 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
16
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Proc. of Advances in Cryptology-Eurocrypt 2000
-
Bellare, M., Pointcheval, D., and Rogaway, P., Authenticated key exchange secure against dictionary attacks. Proc. of Advances in Cryptology-Eurocrypt 2000. Lect. Notes Comput. Sci 1807: 122-138, 2000.
-
(2000)
Lect. Notes Comput. Sci
, vol.1807
, pp. 122-138
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
17
-
-
84937550984
-
Provably secure password based authenticated key exchange protocols using Diffie-Hellman
-
Proc. of Advances in Cryptology-Eurocrypt 2000
-
Boyko, V., MacKenzie, P., and Patel, S., Provably secure password based authenticated key exchange protocols using Diffie-Hellman. Proc. of Advances in Cryptology-Eurocrypt 2000. Lect. Notes Comput. Sci 1807: 156-171, 2000.
-
(2000)
Lect. Notes Comput. Sci
, vol.1807
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
18
-
-
24144491593
-
Password-based authenticated key exchange in the three-party setting
-
Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
-
Abdalla, M., Fouque, P. A., and Pointcheval, D., Password-based authenticated key exchange in the three-party setting. Lect. Notes Comput. Sci 3386:65-84, 2005. (Pubitemid 41231326)
-
(2005)
Lecture Notes in Computer Science
, vol.3386
, pp. 65-84
-
-
Abdalla, M.1
Fouque, P.-A.2
Pointcheval, D.3
-
19
-
-
24144443144
-
Simple password-based encrypted key exchange protocols
-
Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
-
Abdalla, M., and Pointcheval, D., Simple password-based authenticated key protocols. Topics in Cryptology-CT-RSA 2005. Lect. Notes Comput. Sci 3376:191-208, 2005. (Pubitemid 41231212)
-
(2005)
Lecture Notes in Computer Science
, vol.3376
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
-
22
-
-
76349117227
-
Simple password-based three-party authenticated key exchange without server public keys
-
Lee, T.-F., and Hwang, T., Simple password-based three-party authenticated key exchange without server public keys. Inf. Sci. 180(9):1702-1714, 2010.
-
(2010)
Inf. Sci.
, vol.180
, Issue.9
, pp. 1702-1714
-
-
Lee, T.-F.1
Hwang, T.2
|