-
1
-
-
0033790614
-
Managing medical and insurance information through a smart-card-based information system
-
Lambrinoudakis C, Gritzalis S. Managing medical and insurance information through a smart-card-based information system. Journal of Medical Systems 2000; 24(4):213-234.
-
(2000)
Journal of Medical Systems
, vol.24
, Issue.4
, pp. 213-234
-
-
Lambrinoudakis, C.1
Gritzalis, S.2
-
3
-
-
78751642788
-
Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme
-
Khan MK, Kim SK, Alghathbar K. Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme. Computer Communications 2010; 34(3):305-309.
-
(2010)
Computer Communications
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.K.2
Alghathbar, K.3
-
4
-
-
78649335192
-
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
-
Li X, Niu J, Ma J, Wang W, Liu C. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 2011; 34(1):73-79.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 73-79
-
-
Li, X.1
Niu, J.2
Ma, J.3
Wang, W.4
Liu, C.5
-
5
-
-
84861369956
-
Further improvement of Juang 's password-authenticated key agreement scheme using smart cards
-
He D, Chen J, Hu J. Further improvement of Juang et al.'s password-authenticated key agreement scheme using smart cards. Kuwait Journal of Science & Engineering 2011; 38(2A):55-68.
-
(2011)
Kuwait Journal of Science & Engineering
, vol.38
, Issue.2 A
, pp. 55-68
-
-
He, D.1
Chen, J.2
Hu, J.3
-
6
-
-
84866625525
-
Cryptanalysis and security enhancement of Chen 's remote user authentication scheme using smart card
-
Kumari S, Gupta MK, Kumar M. Cryptanalysis and security enhancement of Chen et al.'s remote user authentication scheme using smart card. Central European Journal of Computer Science 2012; 2(1):60-75.
-
(2012)
Central European Journal of Computer Science
, vol.2
, Issue.1
, pp. 60-75
-
-
Kumari, S.1
Gupta, M.K.2
Kumar, M.3
-
7
-
-
84878978708
-
Improvement on a smart card based password authentication scheme
-
He D, Chen J, Hu J. Improvement on a smart card based password authentication scheme. Journal of Internet Technology 2012; 13(3):405-410.
-
(2012)
Journal of Internet Technology
, vol.13
, Issue.3
, pp. 405-410
-
-
He, D.1
Chen, J.2
Hu, J.3
-
8
-
-
84863989374
-
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
-
He D, Chen Y, Chen J. Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dynamics 2012; 69(3):1149-1157.
-
(2012)
Nonlinear Dynamics
, vol.69
, Issue.3
, pp. 1149-1157
-
-
He, D.1
Chen, Y.2
Chen, J.3
-
9
-
-
84878967179
-
Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards
-
He D, Wang D, Wu S. Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards. Information Technology and Control 2013; 42(2):170-177.
-
(2013)
Information Technology and Control
, vol.42
, Issue.2
, pp. 170-177
-
-
He, D.1
Wang, D.2
Wu, S.3
-
10
-
-
84876554631
-
Applying LU decomposition of matrices to design anonymity bilateral remote user authentication scheme
-
Article ID 910409
-
Li X, Niu J, Khan MK, Wang Z. Applying LU decomposition of matrices to design anonymity bilateral remote user authentication scheme. Mathematical Problems in Engineering 2013; Article ID 910409, 10 pages: DOI:10.1155/2013/910409.
-
(2013)
Mathematical Problems in Engineering
, pp. 10
-
-
Li, X.1
Niu, J.2
Khan, M.K.3
Wang, Z.4
-
11
-
-
84883653668
-
An enhanced smart card based remote user password authentication scheme
-
Li X, Niu J, Khan MK, Liao J. An enhanced smart card based remote user password authentication scheme. Journal of Network and Computer Applications 2013; 36(5):1365-1371.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.5
, pp. 1365-1371
-
-
Li, X.1
Niu, J.2
Khan, M.K.3
Liao, J.4
-
12
-
-
84908157951
-
Applying biometrics to design three-factor remote user authentication scheme with key agreement
-
Li X, Niu J, Wang Z, Chen C. Applying biometrics to design three-factor remote user authentication scheme with key agreement. Security and Communication Networks 2013. doi:10.1002/Sec.767.
-
(2013)
Security and Communication Networks
-
-
Li, X.1
Niu, J.2
Wang, Z.3
Chen, C.4
-
13
-
-
84923216123
-
Cryptanalysis of a dynamic identity based remote user authentication scheme with verifiable password update
-
Li X, Niu J, Liao J, Liang W. Cryptanalysis of a dynamic identity based remote user authentication scheme with verifiable password update. International Journal of Communication Systems 2013. doi:10.1002/dac.2676.
-
(2013)
International Journal of Communication Systems
-
-
Li, X.1
Niu, J.2
Liao, J.3
Liang, W.4
-
14
-
-
84906780054
-
More efficient key-hash based fingerprint remote authentication scheme using mobile device
-
Khan MK, Kumari S, Gupta MK. More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 2013. doi:10.1007/s00607-013-0308-2.
-
(2013)
Computing
-
-
Khan, M.K.1
Kumari, S.2
Gupta, M.K.3
-
15
-
-
84910619202
-
More secure smart card based remote user password authentication scheme with user anonymity
-
Kumari S, Khan MK. More secure smart card based remote user password authentication scheme with user anonymity. Security and Communication Networks 2013. doi:10.1002/Sec.916.
-
(2013)
Security and Communication Networks
-
-
Kumari, S.1
Khan, M.K.2
-
16
-
-
84902246739
-
An improved timestamp-based password authentication scheme: comments, cryptanalysis and improvement
-
Kumari S, Gupta MK, Khan MK, Li X. An improved timestamp-based password authentication scheme: comments, cryptanalysis and improvement. Security and Communication Networks 2013. doi:10.1002/Sec.906.
-
(2013)
Security and Communication Networks
-
-
Kumari, S.1
Gupta, M.K.2
Khan, M.K.3
Li, X.4
-
17
-
-
84914669082
-
Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'
-
Kumari S, Khan MK. Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'. International Journal of Communication Systems 2013. doi:10.1002/dac.2590.
-
(2013)
International Journal of Communication Systems
-
-
Kumari, S.1
Khan, M.K.2
-
18
-
-
84878597719
-
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment
-
Li X, Ma J, Wang W, Xiong Y, Zhang J. A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment. Mathematical and Computer Modelling 2013; 58(1-2):85-95.
-
(2013)
Mathematical and Computer Modelling
, vol.58
, Issue.1-2
, pp. 85-95
-
-
Li, X.1
Ma, J.2
Wang, W.3
Xiong, Y.4
Zhang, J.5
-
19
-
-
84856217617
-
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards
-
Li X, Xiong Y, Ma J, Wang W. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications 2012; 35(2):763-769.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.2
, pp. 763-769
-
-
Li, X.1
Xiong, Y.2
Ma, J.3
Wang, W.4
-
20
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
-
He D, Chen J, Hu J. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion 2012; 13(3):223-230.
-
(2012)
Information Fusion
, vol.13
, Issue.3
, pp. 223-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
21
-
-
84859767453
-
An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings
-
He D. An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings. Ad Hoc Networks 2012; 10(6):1009-1016.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.6
, pp. 1009-1016
-
-
He, D.1
-
22
-
-
24344457092
-
Secure authentication scheme for session initiation protocol
-
Yang CC, Wang RC, Liu WT. Secure authentication scheme for session initiation protocol. Computers & Security 2005; 24:381-386.
-
(2005)
Computers & Security
, vol.24
, pp. 381-386
-
-
Yang, C.C.1
Wang, R.C.2
Liu, W.T.3
-
23
-
-
84863985527
-
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
-
He D, Chen J, Chen Y. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks 2012; 5(12): 1423-1429.
-
(2012)
Security and Communication Networks
, vol.5
, Issue.12
, pp. 1423-1429
-
-
He, D.1
Chen, J.2
Chen, Y.3
-
26
-
-
84864058187
-
A more secure authentication scheme for Telecare medicine information systems
-
He DB, Chen JH, Zhang R. A more secure authentication scheme for Telecare medicine information systems. Journal of Medical Systems 2011. doi:10.1007/s10916-011-9658-5.
-
(2011)
Journal of Medical Systems
-
-
He, D.B.1
Chen, J.H.2
Zhang, R.3
-
27
-
-
84867869987
-
An improved authentication scheme for Telecare medicine information systems
-
Wei J, Hu X, Liu W. An improved authentication scheme for Telecare medicine information systems. Journal of Medical Systems 2012. doi:10.1007/s10916-012-9835-1.
-
(2012)
Journal of Medical Systems
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
28
-
-
84867843422
-
An efficient authentication scheme for Telecare medicine information systems
-
Zhu Z. An efficient authentication scheme for Telecare medicine information systems. Journal of Medical Systems 2012. doi:10.1007/s10916-012-9856-9.
-
(2012)
Journal of Medical Systems
-
-
Zhu, Z.1
-
29
-
-
84879569082
-
An authentication scheme for secure access to healthcare services
-
Khan MK, Kumari S. An authentication scheme for secure access to healthcare services. Journal of Medical Systems 2013. doi:10.1007/s10916-013-9954-3.
-
(2013)
Journal of Medical Systems
-
-
Khan, M.K.1
Kumari, S.2
-
30
-
-
84939573910
-
-
Differential power analysis. Proceedings of Advances in Cryptology, Santa Barbara, CA, U.S.A.
-
Kocher P, Jaffe J, Jun B. Differential power analysis. Proceedings of Advances in Cryptology, Santa Barbara, CA, U.S.A., 1999; 388-397.
-
(1999)
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
31
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH. Examining smart-card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51(5):541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
32
-
-
84867867616
-
An efficient and secure dynamic id-based authentication scheme for Telecare medical information systems
-
Chen HM, Lo JW, Yeh CK. An efficient and secure dynamic id-based authentication scheme for Telecare medical information systems. Journal of Medical Systems 2012. doi:10.1007/s10916-012-9862-y.
-
(2012)
Journal of Medical Systems
-
-
Chen, H.M.1
Lo, J.W.2
Yeh, C.K.3
-
33
-
-
84873039261
-
Strong authentication scheme for Telecare medicine information systems
-
Pu Q, Wang J, Zhao R. Strong authentication scheme for Telecare medicine information systems. Journal of Medical Systems 2011. doi:10.1007/s10916-011-9735-9.
-
(2011)
Journal of Medical Systems
-
-
Pu, Q.1
Wang, J.2
Zhao, R.3
|