-
1
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L., Password authentication with insecure communication. Commun. ACM 24(11):770–772, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
2
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1529-1535
-
-
Wu, Z.-Y.1
Lee, Y.-C.2
Lai, F.3
Lee, H.-C.4
Chung, Y.5
-
3
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
Debiao, H., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1989-1995
-
-
Debiao, H.1
Jianhua, C.2
Rui, Z.3
-
4
-
-
84873039261
-
Strong authentication scheme for telecare medicine information systems
-
Pu, Q., Wang, J., Zhao, R., Strong authentication scheme for telecare medicine information systems. J. Med. Syst. 36(4):2609–2619, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.4
, pp. 2609-2619
-
-
Pu, Q.1
Wang, J.2
Zhao, R.3
-
5
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3597-3604
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
6
-
-
84867843422
-
An efficient authentication scheme for telecare medicine information systems
-
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833–3838, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3833-3838
-
-
Zhu, Z.1
-
7
-
-
84879569082
-
An authentication scheme for secure access to healthcare services
-
Muhammad, K.K., and Kumari, S., An authentication scheme for secure access to healthcare services. J. Med. Syst. 37(4):1–12, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.4
, pp. 1-12
-
-
Muhammad, K.K.1
Kumari, S.2
-
8
-
-
84874803351
-
A secure smart-card based authentication and key agreement scheme for telecare medicine information systems
-
Lee, T.-F., and Liu, C.-M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 37(3):1–8, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
, pp. 1-8
-
-
Lee, T.-F.1
Liu, C.-M.2
-
9
-
-
84883262804
-
An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
-
Das, A., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(5):1–17, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.5
, pp. 1-17
-
-
Das, A.1
Bruhadeshwar, B.2
-
10
-
-
84867867616
-
An efficient and secure dynamic id-based authentication scheme for telecare medical information systems
-
Chen, H.-M., Lo, J.-W., Yeh, C.-K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3907-3915
-
-
Chen, H.-M.1
Lo, J.-W.2
Yeh, C.-K.3
-
11
-
-
84872108080
-
A privacy enhanced authentication scheme for telecare medical information systems
-
Qi, J., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.1
, pp. 1-8
-
-
Qi, J.1
Ma, J.2
Ma, Z.3
Li, G.4
-
12
-
-
84872120335
-
Robust anonymous authentication scheme for telecare medical information systems
-
Qi, X., Zhang, J., Na, D., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–8, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-8
-
-
Qi, X.1
Zhang, J.2
Na, D.3
-
13
-
-
84872481143
-
Improved dynamic id-based authentication scheme for telecare medical information systems
-
Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–7, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-7
-
-
Cao, T.1
Zhai, J.2
-
14
-
-
84872112386
-
A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Chang, Y.-F., Yu, S.-H., Shiao, D.-R., A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(2):1–9, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-9
-
-
Chang, Y.-F.1
Yu, S.-H.2
Shiao, D.-R.3
-
15
-
-
84877090869
-
A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Das, A.K., and Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(3):1–16, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
, pp. 1-16
-
-
Das, A.K.1
Goswami, A.2
-
16
-
-
84881359003
-
A biometric authentication scheme for telecare medicine information systems with nonce
-
Awasthi, A., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):1–4, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.5
, pp. 1-4
-
-
Awasthi, A.1
Srivastava, K.2
-
17
-
-
84898905921
-
A user anonymity preserving three-factor authentication scheme for telecare medicine information systems
-
Tan, Z., A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J. Med. Syst. 38(3):1–9, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.3
, pp. 1-9
-
-
Tan, Z.1
-
18
-
-
77955873671
-
-
Yang, D., and Yang, B. A biometric password-based multi-server authentication scheme with smart card.InComputer Design and Applications (ICCDA), 2010 International Conference on. Vol. 5, pp. 554–559, 2010.
-
(2010)
A biometric password-based multi-server authentication scheme with smart card.InComputer Design and Applications (ICCDA), 2010 International Conference on
, vol.5
, pp. 554-559
-
-
Yang, D.1
Yang, B.2
-
19
-
-
79251600218
-
A secure dynamic identity based authentication protocol for multi-server architecture
-
Sood, S.K., Sarje, A.K., Singh, K., A secure dynamic identity based authentication protocol for multi-server architecture. J. Netw. Comput. Appl. 34(2):609–618, 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.2
, pp. 609-618
-
-
Sood, S.K.1
Sarje, A.K.2
Singh, K.3
-
20
-
-
84872324933
-
A smart card based efficient and secured multi-server authentication scheme
-
Wang, B., and Ma, M., A smart card based efficient and secured multi-server authentication scheme. Wirel. Pers. Commun. 68(2):361–378, 2013.
-
(2013)
Wirel. Pers. Commun.
, vol.68
, Issue.2
, pp. 361-378
-
-
Wang, B.1
Ma, M.2
-
21
-
-
84876151110
-
Security flaws in a smart card based authentication scheme for multi-server environment
-
He, D., and Wu, S., Security flaws in a smart card based authentication scheme for multi-server environment. Wirel. Pers. Commun. 70(1):323–329, 2013.
-
(2013)
Wirel. Pers. Commun.
, vol.70
, Issue.1
, pp. 323-329
-
-
He, D.1
Wu, S.2
-
22
-
-
84919951345
-
Robust biometrics-based authentication scheme for multiserver environment
-
He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. Syst J. IEEE PP(99):1–8, 2014.
-
(2014)
Syst J. IEEE
, vol.PP
, Issue.99
, pp. 1-8
-
-
He, D.1
Wang, D.2
-
23
-
-
84888302008
-
An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics
-
Chuang, M.-C., and Chen, M.C., An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics. Expert Syst. Appl. 41(4, Part 1):1411–1418, 2014.
-
(2014)
Expert Syst. Appl.
, vol.41
, Issue.4
, pp. 1411-1418
-
-
Chuang, M.-C.1
Chen, M.C.2
-
24
-
-
50649106124
-
-
Springer-Verlag, New York: Inc., Secaucus, NJ,USA
-
Jain, A.K., Flynn, P., Arun, A.R. Handbook of Biometrics. New York: Springer-Verlag, 2007. Inc., Secaucus, NJ,USA.
-
(2007)
Handbook of Biometrics
-
-
Jain, A.K.1
Flynn, P.2
Arun, A.R.3
-
25
-
-
84919883727
-
Weaver. Biometric authentication
-
Alfred, C., Weaver. Biometric authentication. Computer 39 (2):96–97, 2006.
-
(2006)
Computer
, vol.39
, Issue.2
, pp. 96-97
-
-
Alfred, C.1
-
26
-
-
84939573910
-
-
Kocher, P., Jaffe, J., Jun, B. Differential power analysis.In Advances in Cryptology CRYPTO 99, volume 1666 of lecture notes in computer science, pp. 388–397, 1999.
-
(1999)
Differential power analysis.In Advances in Cryptology CRYPTO 99, volume 1666 of lecture notes in computer science
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
27
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
29
-
-
84862762845
-
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
-
Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K., A dynamic password-based user authentication scheme for hierarchical wireless sensor networks. J. Netw. Comput. Appl. 35(5):1646–1656, 2012.
-
(2012)
J. Netw. Comput. Appl.
, vol.35
, Issue.5
, pp. 1646-1656
-
-
Das, A.K.1
Sharma, P.2
Chatterjee, S.3
Sing, J.K.4
-
30
-
-
78651389846
-
A simple and generic construction of authenticated encryption with associated data
-
Palash Sarkar, A simple and generic construction of authenticated encryption with associated data. ACM Trans. Inf. Syst. Secur. 13(4:article no.33):1–16, 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.4:article33
, pp. 1-16
-
-
Palash Sarkar1
-
31
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
Potlapally, N.R., Ravi, S., Raghunathan, A, Jha, N.K., A study of the energy consumption characteristics of cryptographic algorithms and security protocols. Mob. Comput. IEEE Trans. 5(2):128–143, 2006.
-
(2006)
Mob. Comput. IEEE Trans.
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
32
-
-
84944878354
-
-
Boca Raton, FL: USA
-
Menezes, A.J., Vanstone, S.A., Paul, C. Van Oorschot. Handbook of Applied Cryptography: 1st edition, 1996. Boca Raton, FL, USA.
-
(1996)
Van Oorschot. Handbook of Applied Cryptography: 1st edition
-
-
Menezes, A.J.1
Vanstone, S.A.2
Paul, C.3
|