-
1
-
-
62949130774
-
-
Das, M.L. Two-factor user authentication in wireless sensor networks. IEEE Trans. Wirel. Commun. 8(3):1086–1090, 2009
-
(2009)
Commun
, vol.8
, Issue.3
, pp. 1086-1090
-
-
-
2
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang, M.S., and Li, L.H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1):28–30, 2000
-
(2000)
IEEE Trans. Consum. Electron
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
3
-
-
9544232528
-
Improved remote authentication scheme with smart card
-
Lee, N.Y., and Chiu, Y.C., Improved remote authentication scheme with smart card. Comput. Stand. Interfac. 27(2): 177-180, 2005
-
(2005)
Comput. Stand. Interfac
, vol.27
, Issue.2
, pp. 177-180
-
-
Lee, N.Y.1
Chiu, Y.C.2
-
4
-
-
84891627161
-
A robust smart card-based anonymous user authentication protocol for wireless communications. Secur. Comm
-
Wen, F.T., Susilo, W., and Yang, G.M., A robust smart card-based anonymous user authentication protocol for wireless communications. Secur. Comm. Netw., doi:10.1002/sec.816, 2013
-
Netw., doi:10.1002/sec
, vol.816
, pp. 2013
-
-
Wen, F.T.1
Susilo, W.2
Yang, G.M.3
-
5
-
-
84890555385
-
A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Pers
-
Wen, F.T., Susilo, W, and Yang, G.M., A secure and effective anonymous user authentication scheme for roaming service in global mobility networks. Wireless Pers. Commun. 73(3):993–1004, 2013
-
(2013)
Commun
, vol.73
, Issue.3
, pp. 993-1004
-
-
Wen, F.T.1
Susilo, W.2
Yang, G.M.3
-
6
-
-
52949137008
-
Two-factor mutual authentication based on smart cards and passwords
-
Yang, G., Wong, D.S., Wang, H., and Deng, X., Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7):1160–1172, 2008
-
(2008)
J. Comput. Syst. Sci
, vol.74
, Issue.7
, pp. 1160-1172
-
-
Yang, G.1
Wong, D.S.2
Wang, H.3
Deng, X.4
-
7
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012
-
(2012)
J. Med. Syst
, vol.36
, Issue.3
, pp. 1529-1535
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
8
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He, D.B., Chen, J.H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012
-
(2012)
J. Med. Syst
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.B.1
Chen, J.H.2
Zhang, R.3
-
9
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012
-
(2012)
J. Med. Syst
, vol.36
, Issue.6
, pp. 3597-3604
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
10
-
-
84867843422
-
An effcient authentication scheme for telecare medicine information systems
-
Zhu, Z., An effcient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012
-
(2012)
J. Med. Syst
, vol.36
, Issue.6
, pp. 3833-3838
-
-
Zhu, Z.1
-
11
-
-
84867867616
-
An effcient and secure dynamic id-based authentication scheme for telecare medical information systems
-
Chen, H.M., Lo, J.W., and Yeh, C.K., An effcient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012
-
(2012)
J. Med. Syst
, vol.36
, Issue.6
, pp. 3907-3915
-
-
Chen, H.M.1
Lo, J.W.2
Yeh, C.K.3
-
12
-
-
78751642788
-
Cryptanalysis and security enhancement of a more effcient & secure dynamic ID-based remote user authentication scheme
-
Khan, M.K., Kim, S.K., and Alghathbar, K., Cryptanalysis and security enhancement of a more effcient & secure dynamic ID-based remote user authentication scheme. Comput. Commun. 34(3):305–309, 2011
-
(2011)
Comput. Commun
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.K.2
Alghathbar, K.3
-
13
-
-
84872108080
-
-
Z., and Li, G.S.: A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst
-
Jiang, Q., Ma, J.F., Ma, Z., and Li, G.S., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 2013. doi:10.1007/s10916-012-9897-0
-
(2013)
Ma
-
-
Jiang, Q.1
Ma, J.F.2
-
14
-
-
84879448131
-
-
Wu, F., and Xu, L.L., Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J. Med. Syst
-
Wu, F., and Xu, L.L., Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J. Med. Syst. doi:10.1007/s10916-013-9958-z, 2013
-
-
-
-
15
-
-
84947778144
-
The Decision Diffe-Hellman Problem. In Proc. Third Algorithmic Number Theory Symposium
-
D. Boneh, The Decision Diffe-Hellman Problem. In Proc. Third Algorithmic Number Theory Symposium, Springer press,1998, pp.48-63
-
(1998)
Springer press
, pp. 48-63
-
-
Boneh, D.1
-
17
-
-
84883251252
-
-
Kumari, S., Khan, M.K., and Kumar, R., Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems. J. Med. Syst
-
Kumari, S., Khan, M.K., and Kumar, R., Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems. J. Med. Syst. doi:10.1007/s10916-013-9952-5, 2013
-
-
-
-
18
-
-
84939573910
-
Differential power analysis. Proceedings of Advances in Cryptology: Santa Barbara, CA
-
Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. Proceedings of Advances in Cryptology: Santa Barbara, CA, USA., 388–397, 1999
-
(1999)
USA.
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
19
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T.S., Dabbish, E.A., and Sloan, E.A., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002
-
(2002)
IEEE Trans. Comput
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, E.A.3
-
20
-
-
0025386404
-
A logic of authentication. ACM Trans
-
Burrows, M., Abadi, M., and Needham, R., A logic of authentication. ACM Trans. Comput. Syst. 8(1):18–36, 1990
-
(1990)
Comput. Syst
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
21
-
-
84872112386
-
An uniqueness and anonymity-preserving remote user authentication scheme for connected health care
-
Chang, Y.F., Yu, S.H., and Shiao, D.R., An uniqueness and anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9902, 2013
-
(2013)
J. Med. Syst
, vol.37
, pp. 9902
-
-
Chang, Y.F.1
Yu, S.H.2
Shiao, D.R.3
|