-
1
-
-
84905560414
-
An improved anonymous authentication scheme for telecare medical information systems
-
Wen, F., Guo D., An improved anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 38(5):1–11, 2014. doi:10.1007/s10916-014-0026-0.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.5
, pp. 1-11
-
-
Wen, F.1
Guo, D.2
-
2
-
-
84867867616
-
An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems
-
Chen, H. M., Lo, J. W., Yeh, C. K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3907-3915
-
-
Chen, H.M.1
Lo, J.W.2
Yeh, C.K.3
-
3
-
-
84867860941
-
Secure communication of medical information using mobile agents
-
Nikooghadam, M., Zakerolhosseini, A., Secure communication of medical information using mobile agents. J. Med. Syst. 36(6):3839–3850, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3839-3850
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
-
4
-
-
84905560661
-
On the security of two remote user authentication schemes for telecare medical information systems
-
Kim, K.-W., Lee, J.-D., On the security of two remote user authentication schemes for telecare medical information systems. J. Med. Syst. 2014. doi:10.1007/s10916-014-0017-1.
-
(2014)
J. Med. Syst.
-
-
Kim, K.-W.1
Lee, J.-D.2
-
5
-
-
59649083248
-
A more efficient and secure dynamic ID-based remote user authentication scheme
-
Wang, Y.-Y., Liu, J.-Y., Xiao, F.-X., Dan, J., A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32(4):583–585, 2009.
-
(2009)
Comput. Commun.
, vol.32
, Issue.4
, pp. 583-585
-
-
Wang, Y.-Y.1
Liu, J.-Y.2
Xiao, F.-X.3
Dan, J.4
-
6
-
-
78751642788
-
Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme
-
Khan, M. K., Kim, S.-K., Alghathbar, K., Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme. Comput. Commun. 34(3):305–309, 2011.
-
(2011)
Comput. Commun.
, vol.34
, Issue.3
, pp. 305-309
-
-
Khan, M.K.1
Kim, S.-K.2
Alghathbar, K.3
-
7
-
-
84872120335
-
Robust anonymous authentication scheme for telecare medical information systems
-
Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 2013. doi:10.1007/s10916-012-9911-6.
-
(2013)
J. Med. Syst.
-
-
Xie, Q.1
Zhang, J.2
Dong, N.3
-
8
-
-
84872108080
-
A privacy enhanced authentication scheme for telecare medical information systems
-
Jiang, Q., Ma, J.F., Ma, Z., Li, G.S., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 2013. doi:10.1007/s10916-012-9897-0.
-
(2013)
J. Med. Syst.
-
-
Jiang, Q.1
Ma, J.F.2
Ma, Z.3
Li, G.S.4
-
9
-
-
84879448131
-
Security analysis and improvement of a privacy authentication scheme for telecare medical information systems
-
Wu, F., Xu, L.L., Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J. Med. Syst. 2013. doi:10.1007/s10916-013-9958-z.
-
(2013)
J. Med. Syst.
-
-
Wu, F.1
Xu, L.L.2
-
10
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1529-1535
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
11
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He, D., Chen, J., Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
12
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3597-3604
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
13
-
-
84867843422
-
An efficient authentication scheme for telecare medicine information systems
-
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3833-3838
-
-
Zhu, Z.1
-
14
-
-
84879569082
-
An authentication scheme for secure access to healthcare services
-
Khan, M.K., Kumari, S., An authentication scheme for secure access to healthcare services. J. Med. Syst. 2013. doi:10.1007/s10916-013-9954-3.
-
(2013)
J. Med. Syst.
-
-
Khan, M.K.1
Kumari, S.2
-
15
-
-
84874803351
-
A secure smart-card based authentication and key agreement scheme for telecare medicine information systems
-
Lee, T.-F., Liu, C.-M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 2013. doi:10.1007/s10916-013-9933-8.
-
(2013)
J. Med. Syst.
-
-
Lee, T.-F.1
Liu, C.-M.2
-
16
-
-
84919343487
-
Cryptanalysis and security enhancement of Zhu’s authentication scheme for telecare medicine information system
-
Muhaya, F. T. B., Cryptanalysis and security enhancement of Zhu’s authentication scheme for telecare medicine information system. Secur. Commun. Netw. 2014. doi:10.1002/sec.967.
-
(2014)
Secur. Commun. Netw.
-
-
Muhaya, F.T.B.1
-
17
-
-
84897046003
-
A study on biometric template security
-
Radha, N., Karthikeyan, S., A study on biometric template security. ICTACT J Soft Comput 1(1):37–41, 2010.
-
(2010)
ICTACT J Soft Comput
, vol.1
, Issue.1
, pp. 37-41
-
-
Radha, N.1
Karthikeyan, S.2
-
18
-
-
84881359003
-
A biometric authentication scheme for telecare medicine information systems with nonce
-
Awasthi, A. K., Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 2013. doi:10.1007/s10916-013-9964-1.
-
(2013)
J. Med. Syst.
-
-
Awasthi, A.K.1
Srivastava, K.2
-
19
-
-
84901726882
-
Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce
-
Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 2014. doi:10.1007/s10916-014-0041-1.
-
(2014)
J. Med. Syst.
-
-
Mishra, D.1
Mukhopadhyay, S.2
Kumari, S.3
Khan, M.K.4
Chaturvedi, A.5
-
20
-
-
84898905921
-
A user anonymity preserving three-factor authentication scheme for telecare medicine information systems
-
Tan, Z., A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J. Med. Syst. 2014. doi:10.1007/s10916-014-0016-2.
-
(2014)
J. Med. Syst.
-
-
Tan, Z.1
-
21
-
-
84891784504
-
A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems
-
Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems. J. Med. Syst. 2014. doi:10.1007/s10916-013-9994-8.
-
(2014)
J. Med. Syst.
-
-
Xu, X.1
Zhu, P.2
Wen, Q.3
Jin, Z.4
Zhang, H.5
He, L.6
-
22
-
-
84883262804
-
An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
-
Das, A. K., Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37, 2013. doi:10.1007/s10916-013-9969-9.
-
(2013)
J. Med. Syst
, pp. 37
-
-
Das, A.K.1
Bruhadeshwar, B.2
-
23
-
-
84863200393
-
A password-based user authentication scheme for the integrated EPR information system
-
Wu, Z.-Y., Chung, Y., Lai, F., Chen, T.-S., A password-based user authentication scheme for the integrated EPR information system. J. Med. Syst. 36(2):631–638, 2012. doi:10.1007/s10916-010-9527-7.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.2
, pp. 631-638
-
-
Wu, Z.-Y.1
Chung, Y.2
Lai, F.3
Chen, T.-S.4
-
24
-
-
84867864948
-
An Authentication Scheme to Healthcare Security under Wireless Sensor Networks
-
Hsiao, T.-C., Liao, Y.-T., Huang, J.-Y., Chen, T.-Z., Horng, G.-B., An Authentication Scheme to Healthcare Security under Wireless Sensor Networks. J. Med. Syst. 36(2):3649–3664, 2012. doi:10.1007/s10916-012-9839-x.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.2
, pp. 3649-3664
-
-
Hsiao, T.-C.1
Liao, Y.-T.2
Huang, J.-Y.3
Chen, T.-Z.4
Horng, G.-B.5
-
25
-
-
84883088262
-
A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems
-
Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P., A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 37, 2013. doi:10.1007/s10916-013-9972-1.
-
(2013)
J. Med. Syst
, pp. 37
-
-
Yan, X.1
Li, W.2
Li, P.3
Wang, J.4
Hao, X.5
Gong, P.6
-
26
-
-
84872481143
-
Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
-
Cao, T., Zhai, J., Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems.J. Med. Syst. 37, 2013. doi:10.1007/s10916-012-9912-5.
-
(2013)
J. Med. Syst
, pp. 37
-
-
Cao, T.1
Zhai, J.2
-
27
-
-
84872483621
-
-
Lin, H.-Y., On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems. J. Med. Syst. 37, 2013
-
Lin, H.-Y., On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems. J. Med. Syst. 37, 2013. doi:10.1007/s10916-013-9929-4.
-
-
-
-
28
-
-
84872265840
-
A chaotic map-based authentication scheme for telecare medicine information systems
-
Hao, X., Wang, J., Yang, Q., Yan, X., and Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37:9919, 2013. doi:10.1007/s10916-012-9919-y.
-
(2013)
J. Med. Syst.
, vol.37
, pp. 9919
-
-
Hao, X.1
Wang, J.2
Yang, Q.3
Yan, X.4
Li, P.5
-
29
-
-
84886744243
-
Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
-
Yau, W.-C., Phan, R. C.-W., Security Analysis of a Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 37:9993, 2013. doi:10.1007/s10916-013-9993-9.
-
(2013)
J. Med. Syst.
, vol.37
, pp. 9993
-
-
Yau, W.-C.1
Phan, R.C.-W.2
-
30
-
-
84872112386
-
An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Chang, Y.-F., Yu, S.-H., Shiao, D.-R., An uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9902, 2013. doi:10.1007/s10916-012-9902-7.
-
(2013)
J. Med. Syst
, vol.37
, pp. 9902
-
-
Chang, Y.-F.1
Yu, S.-H.2
Shiao, D.-R.3
-
31
-
-
84877090869
-
A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Das, A. K., Goswami, A., A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9948, 2013. doi:10.1007/s10916-013-9948-1.
-
(2013)
J. Med. Syst.
, vol.37
, pp. 9948
-
-
Das, A.K.1
Goswami, A.2
-
32
-
-
84885502741
-
uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
-
Wen, F., A robust uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. J. Med. Syst. 37:9980, 2013. doi:10.1007/s10916-013-9980-1.
-
(2013)
J. Med. Syst
, vol.37
, pp. 9980
-
-
Wen, F.1
robust, A.2
-
33
-
-
84893021026
-
An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem
-
Zhao, Z., An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem. J. Med. Syst. 38, 2014. doi:10.1007/s10916-014-0013-5.
-
(2014)
J. Med. Syst
, pp. 38
-
-
Zhao, Z.1
-
34
-
-
84904039251
-
Cryptanalysis and Improvement of Yan .’s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems
-
Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and Improvement of Yan et al.’s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38, 2014. doi:10.1007/s10916-014-0024-2.
-
(2014)
J. Med. Syst
, pp. 38
-
-
Mishra, D.1
Mukhopadhyay, S.2
Chaturvedi, A.3
Kumari, S.4
Khan, M.K.5
-
35
-
-
84904035979
-
An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function
-
Das, A. K., Goswami, A., An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function. J. Med. Syst. 38, 2014. doi:10.1007/s10916-014-0027-z.
-
(2014)
J. Med. Syst
, pp. 38
-
-
Das, A.K.1
Goswami, A.2
-
36
-
-
84905560040
-
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care
-
Xie, Q., Liu, W., Wang, S., Han, L., Hu, B., Wu, T., Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care. J. Med. Syst. 38, 2014. doi:10.1007/s10916-014-0091-4.
-
(2014)
J. Med. Syst
, pp. 38
-
-
Xie, Q.1
Liu, W.2
Wang, S.3
Han, L.4
Hu, B.5
Wu, T.6
-
37
-
-
84893187211
-
-
Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Med. Syst. 38, 2014
-
Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Med. Syst. 38, 2014. doi:10.1007/s10916-014-0012-6.
-
-
-
-
38
-
-
84905560609
-
-
Li, C.-T., Lee, C.-C., Weng, C.-Y., A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems. J. Med. Syst. 38, 2014
-
Li, C.-T., Lee, C.-C., Weng, C.-Y., A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems. J. Med. Syst. 38, 2014. doi:10.1007/s10916-014-0077-2.
-
-
-
-
39
-
-
84901732410
-
A more secure anonymous user authentication scheme for the integrated EPR information system
-
Wen, F., A more secure anonymous user authentication scheme for the integrated EPR information system. J. Med. Syst. 2014. doi:10.1007/s10916-014-0042-0.
-
(2014)
J. Med. Syst.
-
-
Wen, F.1
-
40
-
-
11244267013
-
-
Springer, New York, USA:
-
Hankerson, D., Menezes, A., Vanstone, S., Guide to elliptic curve cryptography. Springer, New York, USA, 2004.
-
(2004)
Guide to elliptic curve cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
41
-
-
0043135196
-
Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments
-
Vanstone, S. A., Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments. Inf. Secur. Tech. Rep. 12:78–87, 1997.
-
(1997)
Inf. Secur. Tech. Rep.
, vol.12
, pp. 78-87
-
-
Vanstone, S.A.1
-
42
-
-
79551555868
-
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem
-
Nikooghadam, M., Zakerolhosseini, A., An efficient blind signature scheme based on the elliptic curve discrete logarithm problem. The ISC International Journal of Information Security. 8(10):125–131, 2009.
-
(2009)
The ISC International Journal of Information Security.
, vol.8
, Issue.10
, pp. 125-131
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
-
44
-
-
84879686596
-
Secure Transmission of Mobile Agent in Dynamic Distributed Environments
-
Zakerolhosseini, A., Nikooghadam, M., Secure Transmission of Mobile Agent in Dynamic Distributed Environments. Wireless Personal Communications, 70(2):641–656, 2013. doi:10.1007/s11277-012-0712-5.
-
(2013)
Wireless Personal Communications
, vol.70
, Issue.2
, pp. 641-656
-
-
Zakerolhosseini, A.1
Nikooghadam, M.2
-
45
-
-
77956061440
-
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
-
Nikooghadam, M., Zakerolhosseini, A., Moghaddam, M.E., Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J. Syst. Softw. 83(10):1917–1929, 2010.
-
(2010)
J. Syst. Softw.
, vol.83
, Issue.10
, pp. 1917-1929
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
Moghaddam, M.E.3
-
46
-
-
84861968902
-
An Improved Fast and Secure Hash Algorithm
-
Agarwal, S., Rungta, A., Padmavathy, R., Shankar, M., Rajan, N., An Improved Fast and Secure Hash Algorithm. Journal of Information Processing Systems. 8(1):119–132, 2012.
-
(2012)
Journal of Information Processing Systems.
, vol.8
, Issue.1
, pp. 119-132
-
-
Agarwal, S.1
Rungta, A.2
Padmavathy, R.3
Shankar, M.4
Rajan, N.5
-
47
-
-
35248839355
-
-
Linnartz, J.-P., Tuyls, P., New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proceedings of the Audio- and Video-Based Person Authentication. 2688:393–402, 2003. Guildford, UK
-
Linnartz, J.-P., Tuyls, P., New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proceedings of the Audio- and Video-Based Person Authentication. 2688:393–402, 2003. Guildford, UK. doi:10.1007/3-540-44887-X_47.
-
-
-
-
48
-
-
0242503138
-
-
John Wiley & Sons, Inc., New York, NY, USA:
-
Nanavati, S., Thieme, M., Nanavati, R., Biometrics: Identity Verification in a Networked World. John Wiley & Sons, Inc., New York, NY, USA. 2002.
-
(2002)
Biometrics: Identity Verification in a Networked World
-
-
Nanavati, S.1
Thieme, M.2
Nanavati, R.3
-
49
-
-
0348003132
-
The state of elliptic curve cryptography
-
Koblitz, N., Menezes, A., Vanstone, S., The state of elliptic curve cryptography. Des. Code. Crypt. 19:173–193, 2000.
-
(2000)
Des. Code. Crypt.
, vol.19
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.3
-
50
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
Johnson, D., Menezes, A., Vanstone, S., The elliptic curve digital signature algorithm (ECDSA). Inter. J. Inf. Secur. 1(1):36–63, 2001. doi:10.1007/s102070100002.
-
(2001)
Inter. J. Inf. Secur.
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
51
-
-
69949114528
-
-
Inuma, M., Otsuka, A., Imai, H., Theoretical framework for constructing matching algorithms in biometric authentication systems. In: Proc of ICB’09. Lecture notes in computer science. 5558:806–815, 2009. Springer Berlin Heidelberg
-
Inuma, M., Otsuka, A., Imai, H., Theoretical framework for constructing matching algorithms in biometric authentication systems. In: Proc of ICB’09. Lecture notes in computer science. 5558:806–815, 2009. Springer Berlin Heidelberg. doi:10.1007/978-3-642-01793-3_82.
-
-
-
-
52
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
-
He D., Chen J., Hu J., An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf. Fusion 13(3):223–230, 2012.
-
(2012)
Inf. Fusion
, vol.13
, Issue.3
, pp. 223-230
-
-
He, D.1
Chen, J.2
Hu, J.3
|