-
1
-
-
84904066086
-
A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion
-
doi: 10.1002/sec.900
-
Leng, L., Teoh, A.B.J., Li, M., Khan, and M.K., A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Sec. Commun. Netw., 2013. doi: 10.1002/sec.900
-
(2013)
Sec. Commun. Netw.
-
-
Leng, L.1
Teoh, A.B.J.2
Li, M.3
Khan, M.K.4
-
2
-
-
84879569082
-
An authentication scheme for secure access to healthcare services
-
Khan, M.K., and Kumari, S., An authentication scheme for secure access to healthcare services. J. Med. Syst. 37(4):1-12, 2012
-
(2012)
J. Med. Syst.
, vol.37
, Issue.4
, pp. 1-12
-
-
Khan, M.K.1
Kumari, S.2
-
3
-
-
84883251252
-
Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems
-
Kumari, S., Khan, M.K., and Kumar, R., Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems. J. Med. Syst. 37(4):1-11, 2012
-
(2012)
J. Med. Syst.
, vol.37
, Issue.4
, pp. 1-11
-
-
Kumari, S.1
Khan, M.K.2
Kumar, R.3
-
4
-
-
84872481143
-
Improved dynamic ID-based authentication scheme for telecare medical information systems
-
Cao, T., and Zhai, J., Improved dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1-7, 2013
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-7
-
-
Cao, T.1
Zhai, J.2
-
5
-
-
84867867616
-
An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems
-
Chen, H.M., Lo, J.W., and Yeh, C.K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907-3915, 2012
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3907-3915
-
-
Chen, H.M.1
Lo, J.W.2
Yeh, C.K.3
-
6
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
Debiao, H., Jianhua, C., and Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989-1995, 2012
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1989-1995
-
-
Debiao, H.1
Jianhua, C.2
Rui, Z.3
-
7
-
-
84872483621
-
On the security of a dynamic ID-based authentication scheme for telecare medical information systems
-
Lin, H.Y., On the security of a dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1-5, 2013
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-5
-
-
Lin, H.Y.1
-
8
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597-3604, 2012
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3597-3604
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
9
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529-1535, 2012
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1529-1535
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
10
-
-
84872120335
-
Robust anonymous authentication scheme for telecare medical information systems
-
Xie, Q., Zhang, J., and Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1-8, 2013
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-8
-
-
Xie, Q.1
Zhang, J.2
Dong, N.3
-
11
-
-
84867843422
-
An efficient authentication scheme for telecare medicine information systems
-
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833-3838, 2012
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3833-3838
-
-
Zhu, Z.1
-
12
-
-
79952856380
-
Cancelable palmcode generated from randomized gabor filters for palmprint template protection
-
Leng, L., Zhang, J., Khan, M.K., Chen, X., Ji, M., and Alghathbar, K., Cancelable palmcode generated from randomized gabor filters for palmprint template protection. Sci. Res. Ess. 6(4):784-792. 2011
-
(2011)
Sci. Res. Ess.
, vol.6
, Issue.4
, pp. 784-792
-
-
Leng, L.1
Zhang, J.2
Khan, M.K.3
Chen, X.4
Ji, M.5
Alghathbar, K.6
-
13
-
-
84904066088
-
Palmhash code vs palmphasor code
-
Leng, L., and Zhang, J., Palmhash code vs. palmphasor code. Neurocomput., 2012
-
(2012)
Neurocomput.
-
-
Leng, L.1
Zhang, J.2
-
14
-
-
78650819638
-
Challenge-response-based biometric image scrambling for secure personal identification
-
Khan, M.K., Zhang, J., and Alghathbar, K., Challenge-response-based biometric image scrambling for secure personal identification. Futur. Gener. Comput. Syst. 27(4):411-418, 2011
-
(2011)
Futur. Gener. Comput. Syst.
, vol.27
, Issue.4
, pp. 411-418
-
-
Khan, M.K.1
Zhang, J.2
Alghathbar, K.3
-
15
-
-
27144539209
-
Protecting biometric data for personal identification
-
Khan, M.K., Zhang, J., and Tian, L., Protecting biometric data for personal identification. In: Advances in Biometric Person Authentication: Springer, 629-638, 2005
-
(2005)
Advances in Biometric Person Authentication: Springer
, pp. 629-638
-
-
Khan, M.K.1
Zhang, J.2
Tian, L.3
-
16
-
-
84904046919
-
An efficient biometrics-based authentication scheme for telecare medicine information systems
-
Tan, Z., An efficient biometrics-based authentication scheme for telecare medicine information systems. Network 2(3):200-204, 2013
-
(2013)
Network
, vol.2
, Issue.3
, pp. 200-204
-
-
Tan, Z.1
-
17
-
-
84883088262
-
A secure biometrics-based authentication scheme for telecare medicine information systems
-
Yan, X., Li, W., Li, P., Wang, J., Hao, X., and Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(5):1-6, 2013
-
(2013)
J. Med. Syst.
, vol.37
, Issue.5
, pp. 1-6
-
-
Yan, X.1
Li, W.2
Li, P.3
Wang, J.4
Hao, X.5
Gong, P.6
-
18
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
DOI 10.1016/j.patcog.2004.04.011, PII S0031320304001876
-
Jin, A.T.B., Ling, D.N.C., and Goh, A., Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recog. 37(11):2245-2255, 2004 (Pubitemid 40134555)
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ling, D.N.C.2
Goh, A.3
-
19
-
-
78149480833
-
Biohashing for securing minutiae template
-
Belguechi, R., Rosenberger, C., and Ait-Aoudia, S., Biohashing for securing minutiae template. In: 20th International Conference on Pattern Recognition (ICPR), 1168-1171, 2010
-
(2010)
20th International Conference on Pattern Recognition (ICPR)
, pp. 1168-1171
-
-
Belguechi, R.1
Rosenberger, C.2
Ait-Aoudia, S.3
-
20
-
-
33750533142
-
An improved BioHashing for human authentication
-
DOI 10.1016/j.patcog.2006.05.030, PII S0031320306002482
-
Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recogn. 40(3):1057-1065, 2007 (Pubitemid 44667748)
-
(2007)
Pattern Recognition
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
22
-
-
35048818034
-
Correlation power analysis with a leakage model
-
Brier, E., Clavier, C., and Olivier, F., Correlation power analysis with a leakage model. In: Cryptographic Hardware and Embedded Systems-CHES: Springer, 16-29, 2004
-
(2004)
Cryptographic Hardware and Embedded Systems-CHES: Springer
, pp. 16-29
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
23
-
-
51849131973
-
On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., and Shalmani, M.T.M., On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Advances in Cryptology-CRYPTO: Springer, 203-220, 2008
-
(2008)
Advances in Cryptology-CRYPTO: Springer
, pp. 203-220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.T.M.6
-
24
-
-
84939573910
-
Differential power analysis
-
Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. In: Advances in CryptologyCRYPTO99: Springer, 388-397, 1999
-
(1999)
Advances in CryptologyCRYPTO99: Springer
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
25
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
DOI 10.1109/TC.2002.1004593
-
Messerges, T.S., Dabbish, E.A., and Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541-552, 2002 (Pubitemid 34550462)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
27
-
-
4043177806
-
Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards
-
Yang, C.C., Yang, H.W., and Wang, R.C., Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards. IEEE Trans. Consum. Electron. 50(2):578-579, 2004
-
(2004)
IEEE Trans. Consum. Electron.
, vol.50
, Issue.2
, pp. 578-579
-
-
Yang, C.C.1
Yang, H.W.2
Wang, R.C.3
-
28
-
-
0033365053
-
Anonymous channel and authentication in wireless communications
-
Juang, W.S., Lei, C.L., and Chang, C.Y., Anonymous channel and authentication in wireless communications. Comput. Commun. 22(15):1502-1511, 1999
-
(1999)
Comput. Commun.
, vol.22
, Issue.15
, pp. 1502-1511
-
-
Juang, W.S.1
Lei, C.L.2
Chang, C.Y.3
-
29
-
-
78751642788
-
Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme
-
Khan, M.K., Kim, S.K., and Alghathbar, K., Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme. Comput. Commun. 34(3):305-309, 2011
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.K.2
Alghathbar, K.3
-
30
-
-
78751650071
-
An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
-
Xu, J., Zhu, W.T., and Feng, D.G., An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun. 34(3):319-325, 2011
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 319-325
-
-
Xu, J.1
Zhu, W.T.2
Feng, D.G.3
-
31
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Li, C.T., and Hwang, M.S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1-5, 2010
-
(2010)
J. Netw. Comput. Appl.
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
32
-
-
78649335192
-
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
-
Li, X., Niu, J.W., Ma, J., Wang, W.D., and Liu, C.L., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 34(1):73-79, 2011
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 73-79
-
-
Li, X.1
Niu, J.W.2
Ma, J.3
Wang, W.D.4
Liu, C.L.5
-
33
-
-
84870814246
-
Robust biometrics-based remote user authentication scheme using smart cards
-
Truong, T.T., Tran, M.T., and Duong, A.D., Robust biometrics-based remote user authentication scheme using smart cards. In: 15th International Conference on Network-Based Information Systems (NBiS), 384-391, 2012
-
(2012)
15th International Conference on Network-Based Information Systems (NBiS)
, pp. 384-391
-
-
Truong, T.T.1
Tran, M.T.2
Duong, A.D.3
-
34
-
-
84872112386
-
A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Chang, Y.F., Yu, S.H., and Shiao, D.R., A uniqueness-and-anonymity- preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(2):1-9, 2013
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-9
-
-
Chang, Y.F.1
Yu, S.H.2
Shiao, D.R.3
-
35
-
-
84871955339
-
A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
-
Lee, C.C., and Hsu, C.W., A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1-2):201-211, 2013
-
(2013)
Nonlinear Dyn.
, vol.71
, Issue.1-2
, pp. 201-211
-
-
Lee, C.C.1
Hsu, C.W.2
-
36
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
DOI 10.1109/TMC.2006.16
-
Potlapally, N.R., Ravi, S., Raghunathan, A., and Jha, N.K., A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mobile Comput. 5(2):128-143, 2006 (Pubitemid 43671073)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
37
-
-
84949187399
-
The performance measurement of cryptographic primitives on palm devices
-
Wong, D.S., Fuentes, H.H., and Chan, A.H., The performance measurement of cryptographic primitives on palm devices. In: 17th Annual Computer Security Applications Conference (ACSAC-2001), 92-101, 2001
-
(2001)
17th Annual Computer Security Applications Conference (ACSAC-2001)
, pp. 92-101
-
-
Wong, D.S.1
Fuentes, H.H.2
Chan, A.H.3
|