-
2
-
-
35048818034
-
Correlation power analysis with a leakage model
-
Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Cryptographic Hardware and Embedded Systems-CHES 2004. LNCS, Vol. 3156, pp. 16–29. Springer 2004
-
(2004)
Cryptographic Hardware and Embedded Systems-CHES 2004. LNCS, Vol. 3156, pp. 16–29. Springer
-
-
Brier, E.1
Clavier, C.2
Olivier, F.3
-
3
-
-
84872483621
-
Improved dynamic id-based authentication scheme for telecare medical information systems
-
Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–7, 2013.
-
(2013)
J. Med. Syst.
, vol.39
, Issue.2
, pp. 1-7
-
-
Cao, T.1
Zhai, J.2
-
4
-
-
84867867616
-
An efficient and secure dynamic id-based authentication scheme for telecare medical information systems
-
Chen, H. M., Lo, J. W., Yeh, C. K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3907-3915
-
-
Chen, H.M.1
Lo, J.W.2
Yeh, C.K.3
-
5
-
-
85000121842
-
-
Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On the indistinguishability-based security model of key agreement protocols-simple cases. IACR Cryptology ePrint Archive, https://eprint.iacr.org/2005/129.pdf (2005)
-
-
-
-
6
-
-
84877090869
-
A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Das, A. K., and Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37(3):1–16, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
, pp. 1-16
-
-
Das, A.K.1
Goswami, A.2
-
7
-
-
84883262804
-
An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
-
Das, A. K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(5):1–17, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.5
, pp. 1-17
-
-
Das, A.K.1
Bruhadeshwar, B.2
-
8
-
-
51849131973
-
On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Advances in Cryptology–CRYPTO 2008, pp. 203–220. Springer (2008)
-
(2008)
Advances in Cryptology–CRYPTO 2008, pp. 203–220. Springer
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.T.M.6
-
9
-
-
84872265840
-
A chaotic map-based authentication scheme for telecare medicine information systems
-
Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):1–7, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-7
-
-
Hao, X.1
Wang, J.2
Yang, Q.3
Yan, X.4
Li, P.5
-
10
-
-
79951667906
-
Weaknesses of a dynamic id-based remote user authentication scheme
-
He, D., Chen, J., Zhang, R., Weaknesses of a dynamic id-based remote user authentication scheme. Int. J. Electron. Secur. Digit. Forensic 3(4):355–362, 2010.
-
(2010)
Int. J. Electron. Secur. Digit. Forensic
, vol.3
, Issue.4
, pp. 355-362
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
11
-
-
84936743193
-
Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol
-
He, D., Kumar, N., Chilamkurti, N., Lee, J. H., Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol. J. Med. Syst. 38(10):1–6, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.10
, pp. 1-6
-
-
He, D.1
Kumar, N.2
Chilamkurti, N.3
Lee, J.H.4
-
12
-
-
84863989374
-
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
-
He, D., Chen, Y., Chen, J., Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3):1149–1157, 2012.
-
(2012)
Nonlinear Dyn.
, vol.69
, Issue.3
, pp. 1149-1157
-
-
He, D.1
Chen, Y.2
Chen, J.3
-
13
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He, D., Chen, J., Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
14
-
-
84922001116
-
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
-
He, D., Kumar, N., Chen, J., Lee, C. C., Chilamkurti, N., Yeo, S. S.: Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems pp. 1–12 2013. doi:10.1007/s00530-013-0346-9.
-
(2013)
Multimedia Systems
, pp. 1-12
-
-
He, D.1
Kumar, N.2
Chen, J.3
Lee, C.C.4
Chilamkurti, N.5
Yeo, S.S.6
-
15
-
-
84901726882
-
Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce
-
Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. Journal of medical systems 38(5):1–11, 2014.
-
(2014)
Journal of medical systems
, vol.38
, Issue.5
, pp. 1-11
-
-
Mishra, D.1
Mukhopadhyay, S.2
Kumari, S.3
Khan, M.K.4
Chaturvedi, A.5
-
16
-
-
84904039251
-
Cryptanalysis and improvement of yan et al.s biometric-based authentication scheme for telecare medicine information systems
-
Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and improvement of yan et al.s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38(6):1–12, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.6
, pp. 1-12
-
-
Mishra, D.1
Mukhopadhyay, S.2
Chaturvedi, A.3
Kumari, S.4
Khan, M.K.5
-
17
-
-
84905560661
-
On the security of two remote user authentication schemes for telecare medical information systems
-
Kim, K. W., and Lee, J. D., On the security of two remote user authentication schemes for telecare medical information systems. J. Med. Syst. 38(5):1–11, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.5
, pp. 1-11
-
-
Kim, K.W.1
Lee, J.D.2
-
18
-
-
84891784504
-
A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems
-
Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):1–7, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.1
, pp. 1-7
-
-
Xu, X.1
Zhu, P.2
Wen, Q.3
Jin, Z.4
Zhang, H.5
He, L.6
-
19
-
-
84897360924
-
Secure verifier-based three-party authentication schemes without server public keys for data exchange in telecare medicine information systems
-
Lin, T. H., and Lee, T. F., Secure verifier-based three-party authentication schemes without server public keys for data exchange in telecare medicine information systems. J. Med. Syst. 38(5):1–9, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.5
, pp. 1-9
-
-
Lin, T.H.1
Lee, T.F.2
-
20
-
-
84876151110
-
Security flaws in a smart card based authentication scheme for multi-server environment
-
He, D., and Wu, S., Security flaws in a smart card based authentication scheme for multi-server environment. Wirel. Pers. Commun. 70(1):323–329, 2013.
-
(2013)
Wirel. Pers. Commun.
, vol.70
, Issue.1
, pp. 323-329
-
-
He, D.1
Wu, S.2
-
21
-
-
84935925341
-
A Secure and Efficient Chaotic Map-based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems
-
Mishra, D., Srinivas, J., Mukhopadhyay, S., A Secure and Efficient Chaotic Map-based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(10):1–10, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.10
, pp. 1-10
-
-
Mishra, D.1
Srinivas, J.2
Mukhopadhyay, S.3
-
22
-
-
84905576641
-
An improved id-based client authentication with key agreement scheme on ecc for mobile client-server environments
-
Islam, S. H., and Biswas, G., An improved id-based client authentication with key agreement scheme on ecc for mobile client-server environments. Theor. Appl. Inform. 24(4):293–312, 2012.
-
(2012)
Theor. Appl. Inform.
, vol.24
, Issue.4
, pp. 293-312
-
-
Islam, S.H.1
Biswas, G.2
-
23
-
-
84893187211
-
Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems
-
Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):1–8, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.2
, pp. 1-8
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
24
-
-
84872108080
-
A privacy enhanced authentication scheme for telecare medical information systems
-
Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.1
, pp. 1-8
-
-
Jiang, Q.1
Ma, J.2
Ma, Z.3
Li, G.4
-
25
-
-
84939573910
-
Differential power analysis
-
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Advances in Cryptology-CRYPTO’99, pp. 388–397. Springer (1999)
-
(1999)
Advances in Cryptology-CRYPTO’99, pp. 388–397. Springer
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
26
-
-
34547558424
-
Redesigning electronic health record systems to support public health
-
Kukafka, R., Ancker, J.S., Chan, C., Chelico, J., Khan, S., Mortoti, S., Natarajan, K., Presley, K., Stephens, K., Redesigning electronic health record systems to support public health. J. Biomed. Inform. 40(4):398–409, 2007.
-
(2007)
J. Biomed. Inform.
, vol.40
, Issue.4
, pp. 398-409
-
-
Kukafka, R.1
Ancker, J.S.2
Chan, C.3
Chelico, J.4
Khan, S.5
Mortoti, S.6
Natarajan, K.7
Presley, K.8
Stephens, K.9
-
27
-
-
84883251252
-
Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems
-
Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of a privacy enhanced scheme for telecare medical information systems. J. Med. Syst. 37(4):1–11, 2012.
-
(2012)
J. Med. Syst.
, vol.37
, Issue.4
, pp. 1-11
-
-
Kumari, S.1
Khan, M.K.2
Kumar, R.3
-
28
-
-
84891599579
-
An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems
-
Lee, T.F., An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems. J. Med. Syst. 37(6):1–9, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.6
, pp. 1-9
-
-
Lee, T.F.1
-
29
-
-
84874803351
-
A secure smart-card based authentication and key agreement scheme for Telecare medicine Information Systems
-
Lee, T.F., and Liu, C. M., A secure smart-card based authentication and key agreement scheme for Telecare medicine Information Systems. J. Med. Syst. 37(3):1–8, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
, pp. 1-8
-
-
Lee, T.F.1
Liu, C.M.2
-
30
-
-
84872483621
-
On the security of a dynamic id-based authentication scheme for telecare medical information systems
-
Lin, H.Y., On the security of a dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–5, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-5
-
-
Lin, H.Y.1
-
31
-
-
84867888357
-
Development of an ease-of-use remote healthcare system architecture using rfid and networking technologies
-
Lin, S.S., Hung, M.H., Tsai, C.L., Chou, L.P., Development of an ease-of-use remote healthcare system architecture using rfid and networking technologies. J. Med. Syst. 36(6):3605–3619, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3605-3619
-
-
Lin, S.S.1
Hung, M.H.2
Tsai, C.L.3
Chou, L.P.4
-
32
-
-
12144290720
-
Synergy between medical informatics and bioinformatics: facilitating genomic medicine for future health care
-
Martin-Sanchez, F., Iakovidis, I., Nørager, S., Maojo, V., De Groen, P., Van der Lei, J., Jones, T., Abraham-Fuchs, K., Apweiler, R., Babic, A., et al., Synergy between medical informatics and bioinformatics: facilitating genomic medicine for future health care. J. Biomed. Inform. 37(1):30–42, 2004.
-
(2004)
J. Biomed. Inform.
, vol.37
, Issue.1
, pp. 30-42
-
-
Martin-Sanchez, F.1
Iakovidis, I.2
Nørager, S.3
Maojo, V.4
De Groen, P.5
Van der Lei, J.6
Jones, T.7
Abraham-Fuchs, K.8
Apweiler, R.9
Babic, A.10
-
33
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
34
-
-
18044390760
-
Primary care physician time utilization before and after implementation of an electronic health record: a time-motion study
-
Pizziferri, L., Kittler, A.F., Volk, L.A., Honour, M.M., Gupta, S., Wang, S., Wang, T., Lippincott, M., Li, Q., Bates, D.W., Primary care physician time utilization before and after implementation of an electronic health record: a time-motion study. J. Biomed. Inform. 38(3):176–188, 2005.
-
(2005)
J. Biomed. Inform.
, vol.38
, Issue.3
, pp. 176-188
-
-
Pizziferri, L.1
Kittler, A.F.2
Volk, L.A.3
Honour, M.M.4
Gupta, S.5
Wang, S.6
Wang, T.7
Lippincott, M.8
Li, Q.9
Bates, D.W.10
-
35
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K., A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Trans. Mobile Comput. 5(2):128–143, 2006.
-
(2006)
IEEE Trans. Mobile Comput.
, vol.5
, Issue.2
, pp. 128-143
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
36
-
-
84873039261
-
Strong authentication scheme for telecare medicine information systems
-
Pu, Q., Wang, J., Zhao, R., Strong authentication scheme for telecare medicine information systems. J. Med. Syst. 36(4):2609–2619, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.4
, pp. 2609-2619
-
-
Pu, Q.1
Wang, J.2
Zhao, R.3
-
37
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R. L., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120–126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
38
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3597-3604
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
39
-
-
84949187399
-
The performance measurement of cryptographic primitives on palm devices
-
Wong, D. S., Fuentes, H. H., Chan, A. H.: The performance measurement of cryptographic primitives on palm devices. In: Proceedings 17th Annual Computer Security Applications Conference (ACSAC 2001), pp. 92–101. IEEE (2001)
-
(2001)
Proceedings 17th Annual Computer Security Applications Conference (ACSAC 2001), pp. 92–101. IEEE
-
-
Wong, D.S.1
Fuentes, H.H.2
Chan, A.H.3
-
40
-
-
84879448131
-
Security analysis and improvement of a privacy authentication scheme for telecare medical information systems
-
Wu, F., and Xu, L., Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J. Med. Syst. 37(4):1–9, 2013. doi:10.1007/s10916-013-9958-z.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.4
, pp. 1-9
-
-
Wu, F.1
Xu, L.2
-
41
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1529-1535
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
42
-
-
84872120335
-
Robust anonymous authentication scheme for telecare medical information systems
-
Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–8, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-8
-
-
Xie, Q.1
Zhang, J.2
Dong, N.3
-
43
-
-
84891784504
-
A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems
-
Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):1–7, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.1
, pp. 1-7
-
-
Xu, X.1
Zhu, P.2
Wen, Q.3
Jin, Z.4
Zhang, H.5
He, L.6
-
44
-
-
84867843422
-
An efficient authentication scheme for telecare medicine information systems
-
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833–3838, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3833-3838
-
-
Zhu, Z.1
|