-
1
-
-
84883449411
-
The role of privacy protection in healthcare information systems adoption
-
Hsu, C. L., Lee, M. R., and Su, C. H., The role of privacy protection in healthcare information systems adoption. J. Med. Syst. 37(5):1–12, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.5
, pp. 1-12
-
-
Hsu, C.L.1
Lee, M.R.2
Su, C.H.3
-
2
-
-
84876796310
-
U-Healthcare System: State-of-the-Art Review and Challenges
-
Touati, F., and Tabish, R., U-Healthcare System: State-of-the-Art Review and Challenges. J. Med. Syst. 37(3):1–20, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
, pp. 1-20
-
-
Touati, F.1
Tabish, R.2
-
3
-
-
45149118041
-
Identity theft
-
Anderson, K. B., Durbin, E., and Salinger, M. A., Identity theft. J. Econom. Perspect. 22(2):171–192, 2008.
-
(2008)
J. Econom. Perspect.
, vol.22
, Issue.2
, pp. 171-192
-
-
Anderson, K.B.1
Durbin, E.2
Salinger, M.A.3
-
4
-
-
84869455644
-
Biometric authentication: system security and user privacy
-
Jain, A. K., and Nandakumar, K., Biometric authentication: system security and user privacy. IEEE Comput. 45(11):87–92, 2012.
-
(2012)
IEEE Comput.
, vol.45
, Issue.11
, pp. 87-92
-
-
Jain, A.K.1
Nandakumar, K.2
-
5
-
-
0034140374
-
A new remote user authentication scheme using smart cards
-
Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electr. 46(1):28–30, 2000.
-
(2000)
IEEE Trans. Consum. Electr.
, vol.46
, Issue.1
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
6
-
-
0036302680
-
An efficient and practical solution to remote authentication: smart card
-
Chien, H. Y., Jan, J. K., and Tseng, Y. M., An efficient and practical solution to remote authentication: smart card. Comput. Secur. 21(4):372–375, 2002.
-
(2002)
Comput. Secur.
, vol.21
, Issue.4
, pp. 372-375
-
-
Chien, H.Y.1
Jan, J.K.2
Tseng, Y.M.3
-
7
-
-
82655168805
-
An improved timestamp-based remote user authentication scheme
-
Awasthi, A. K., Srivastava, K., and Mittal, R. C., An improved timestamp-based remote user authentication scheme. Comput. Electr. Eng. 37(6):869–874, 2011.
-
(2011)
Comput. Electr. Eng.
, vol.37
, Issue.6
, pp. 869-874
-
-
Awasthi, A.K.1
Srivastava, K.2
Mittal, R.C.3
-
8
-
-
84883653668
-
An enhanced smart card based remote user password authentication scheme
-
Li, X., Niu, J., Khurram Khan, M., and Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365–1371, 2013.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.5
, pp. 1365-1371
-
-
Li, X.1
Niu, J.2
Khurram Khan, M.3
Liao, J.4
-
9
-
-
84891627161
-
A robust smart card-based anonymous user authentication protocol for wireless communications. Secur. Commun
-
Wen, F., Susilo, W., and Yang, G., A robust smart card-based anonymous user authentication protocol for wireless communications. Secur. Commun. Netw. 2013. DOI: 10.1002/sec.816.
-
(2013)
Netw
-
-
Wen, F.1
Susilo, W.2
Yang, G.3
-
10
-
-
4043122631
-
A dynamic ID-based remote user authentication scheme
-
Das, M. L., Saxena, A., and Gulati, V. P., A dynamic ID-based remote user authentication scheme. IEEE Trans. Consum. Electr. 50(2):629–631, 2004.
-
(2004)
IEEE Trans. Consum. Electr.
, vol.50
, Issue.2
, pp. 629-631
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
-
11
-
-
84919899974
-
-
Awasthi, A.K., Comment on a dynamic ID-based remote user authentication scheme. arXiv preprint cs/0410011, 2004. Available on: http://arxiv.org/ftp/cs/papers/0410/0410011.pdf.
-
-
-
-
12
-
-
84878597719
-
A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment
-
Li, X., Ma, J., Wang, W., Xiong, Y., and Zhang, J., A novel smart card and dynamic ID based remote user authentication scheme for multi-server environment. Mathematical and Computer Modelling 58(1–2):85–95, 2013.
-
(2013)
Mathematical and Computer Modelling
, vol.58
, Issue.1-2
, pp. 85-95
-
-
Li, X.1
Ma, J.2
Wang, W.3
Xiong, Y.4
Zhang, J.5
-
13
-
-
84858082073
-
An improved dynamic ID-based remote user authentication with key agreement scheme
-
Wen, F., and Li, X., An improved dynamic ID-based remote user authentication with key agreement scheme. Comput. Electr. Eng. 38(2):381–387, 2012.
-
(2012)
Comput. Electr. Eng.
, vol.38
, Issue.2
, pp. 381-387
-
-
Wen, F.1
Li, X.2
-
14
-
-
84874803351
-
A secure smart-card based authentication and key agreement scheme for telecare medicine information systems
-
Lee, T. F., and Liu, C. M., A secure smart-card based authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 37(3):1–8, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
, pp. 1-8
-
-
Lee, T.F.1
Liu, C.M.2
-
15
-
-
0000474763
-
Differential power analysis
-
Kocher, P., Jaffe, J., and Jun, B., Differential power analysis. Advances in Cryptology-CRYPTO 99:388–397, 1999.
-
(1999)
Advances in Cryptology-CRYPTO
, vol.99
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
16
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T. S., Dabbish, E. A., and Sloan, R. H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.
-
(2002)
IEEE Trans. Comput.
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
17
-
-
51849131973
-
On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme
-
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., and Shalmani, M. T. M., On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme. Advances in Cryptology-CRYPTO 08:203–220, 2008.
-
(2008)
Advances in Cryptology-CRYPTO
, vol.8
, pp. 203-220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.T.M.6
-
18
-
-
84867867616
-
An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems
-
Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3907-3915
-
-
Chen, H.M.1
Lo, J.W.2
Yeh, C.K.3
-
19
-
-
84872481143
-
Improved dynamic ID-based authentication scheme for telecare medical information systems
-
Cao, T., and Zhai, J., Improved dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–7, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-7
-
-
Cao, T.1
Zhai, J.2
-
20
-
-
84872120335
-
Robust anonymous authentication scheme for telecare medical information systems
-
Xie, Q., Zhang, J., and Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–8, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-8
-
-
Xie, Q.1
Zhang, J.2
Dong, N.3
-
21
-
-
70450285606
-
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics
-
Fan, C. I., and Lin, Y. H., Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Trans. Inf. Foren. Sec. 4(4):933–945, 2009.
-
(2009)
IEEE Trans. Inf. Foren. Sec.
, vol.4
, Issue.4
, pp. 933-945
-
-
Fan, C.I.1
Lin, Y.H.2
-
22
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Li, C. T., and Hwang, M. S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1–5, 2010.
-
(2010)
J. Netw. Comput. Appl.
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
23
-
-
78649335192
-
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
-
Li, X., Niu, J., Ma, J., Wang, W., and Liu, C., Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards. Journal of Network and Computer Applications 34(1):73–79, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 73-79
-
-
Li, X.1
Niu, J.2
Ma, J.3
Wang, W.4
Liu, C.5
-
24
-
-
84908157951
-
-
Li, X., Niu, J., Wang, Z., Chen, C., Applying biometrics to design three-factor remote user authentication scheme with key agreement. Security and Communication Networks, 2013, in press
-
Li, X., Niu, J., Wang, Z., Chen, C., Applying biometrics to design three-factor remote user authentication scheme with key agreement. Security and Communication Networks, 2013, in press, DOI: 10.1002/sec.767.
-
-
-
-
25
-
-
84979231101
-
-
Li, X., Niu, J., Khan, M., Liao, J., Zhao, X., Robust three-factor remote user authentication scheme with key agreement for multimedia systems. Security and Communication Networks, 2013, in press
-
Li, X., Niu, J., Khan, M., Liao, J., Zhao, X., Robust three-factor remote user authentication scheme with key agreement for multimedia systems. Security and Communication Networks, 2013, in press, DOI: 10.1002/sec.961.
-
-
-
-
26
-
-
79959689122
-
A generic framework for three-factor authentication: preserving security and privacy in distributed systems
-
Huang, X., Xiang, Y., Chonka, A., Zhou, J., and Deng, R. H., A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8):1390–1397, 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst.
, vol.22
, Issue.8
, pp. 1390-1397
-
-
Huang, X.1
Xiang, Y.2
Chonka, A.3
Zhou, J.4
Deng, R.H.5
-
27
-
-
84883262804
-
An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
-
Das, A. K., and Bruhadeshwar, B., An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system. J. Med. Syst. 37(5):1–17, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.5
, pp. 1-17
-
-
Das, A.K.1
Bruhadeshwar, B.2
-
28
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He, D., Chen, J., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
29
-
-
84881359003
-
A biometric authentication scheme for telecare medicine information systems with nonce
-
Awasthi, A. K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):1–4, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.5
, pp. 1-4
-
-
Awasthi, A.K.1
Srivastava, K.2
-
30
-
-
84919899971
-
-
Mishra, D., and Mukhopadhyay, S., Security enhancement of biometric authentication scheme for telecare medicine information systems with nonce. arXiv preprint arXiv:1309.4690, 2013. Available on: http://arxiv.org/pdf/1309.4690v2.pdf.
-
-
-
-
31
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1):97–139, 2008.
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
32
-
-
0000523051
-
A logic of authentication
-
Burrows, M., Abadi, M., and Needham, R., A logic of authentication. Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences 426(1871):233–271, 1989.
-
(1989)
Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences
, vol.426
, Issue.1871
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
33
-
-
71849087704
-
Public-key cryptography and password protocols
-
Halevi, S., and Krawczyk, H., Public-key cryptography and password protocols. ACM Transactions on Information and System Security (TISSEC) 2(3):230–268, 1999.
-
(1999)
ACM Transactions on Information and System Security (TISSEC)
, vol.2
, Issue.3
, pp. 230-268
-
-
Halevi, S.1
Krawczyk, H.2
-
34
-
-
84884135156
-
An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks
-
Li, X., Wen, Q., Zhang, H., and Jin, Z., An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. International Journal of Network Management 23(5):311–324, 2013.
-
(2013)
International Journal of Network Management
, vol.23
, Issue.5
, pp. 311-324
-
-
Li, X.1
Wen, Q.2
Zhang, H.3
Jin, Z.4
|