-
1
-
-
84904066086
-
-
Leng, L., Teoh, A.B.J., Li, M., Khan, M.K.: A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion
-
Leng, L., Teoh, A.B.J., Li, M., Khan, M.K.: A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional palmphasor-fusion. Sec. Commun. Netw. doi:10.1002/sec.900(2013)
-
(2013)
Sec. Commun. Netw
-
-
-
2
-
-
84936743193
-
Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol
-
He, D.B., Kumar, N., Chilamkurti, N., Lee, J.H., Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10):1–6, 2014.
-
(2014)
J. Med. Syst
, vol.38
, Issue.10
, pp. 1-6
-
-
He, D.B.1
Kumar, N.2
Chilamkurti, N.3
Lee, J.H.4
-
3
-
-
84921481484
-
Authentication protocol for ambient assisted living system
-
He, D.B., and Zeadally, S., Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 53(1):2–8, 2015.
-
(2015)
IEEE Commun. Mag
, vol.53
, Issue.1
, pp. 2-8
-
-
He, D.B.1
Zeadally, S.2
-
4
-
-
84925326266
-
-
Lu, Y.R., Li, L.X., Peng, H.P., Yang, X., Yang, Y.X.: A lightweight ID based authentication and key agreement protocol for multi-server architecture, Article ID 635890, 1-16, 2015
-
Lu, Y.R., Li, L.X., Peng, H.P., Yang, X., Yang, Y.X.: A lightweight ID based authentication and key agreement protocol for multi-server architecture, Int. J. Distrib. Sens. N., Article ID 635890, 1-16, 2015. in press (2015)
-
(2015)
Int. J. Distrib. Sens. N
-
-
-
5
-
-
84928473734
-
-
Lu, Y.R., Li, L.X., Yang, Y.X.: Robust and efficient authentication scheme for session initiation protocol. Article ID 894549, 1-16
-
Lu, Y.R., Li, L.X., Yang, Y.X.: Robust and efficient authentication scheme for session initiation protocol.Math. Probl. Eng2015, Article ID 894549, 1-16, in press (2015)
-
(2015)
Math. Probl. Eng
-
-
-
6
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
-
(2012)
J. Med. Syst
, vol.36
, Issue.3
, pp. 1529-1535
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
7
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He, D., Chen, J., Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.
-
(2012)
J. Med. Syst
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
8
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
-
(2012)
J. Med. Syst
, vol.36
, Issue.6
, pp. 3597-3604
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
9
-
-
84867843422
-
An efficient authentication scheme for telecare medicine information systems
-
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.
-
(2012)
J. Med. Syst
, vol.36
, Issue.6
, pp. 3833-3838
-
-
Zhu, Z.1
-
10
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120–126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
11
-
-
84879448131
-
Security analysis and improvement of a privacy authentication scheme for telecare medical information systems
-
Wu, F., and Xu, L.L., Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J. Med. Syst. 37:1–9, 2013.
-
(2013)
J. Med. Syst
, vol.37
, pp. 1-9
-
-
Wu, F.1
Xu, L.L.2
-
12
-
-
84872108080
-
A privacy enhanced authentication scheme for telecare medical information systems
-
Jiang, Q., Ma, J.F., Ma, Z., Li, G.S., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.
-
(2013)
J. Med. Syst
, vol.37
, Issue.1
, pp. 1-8
-
-
Jiang, Q.1
Ma, J.F.2
Ma, Z.3
Li, G.S.4
-
13
-
-
84905560414
-
An improved anonymous authentication scheme for telecare medical information systems
-
Wen, F.T., and Guo, D.l., An improved anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 38(5):1–11, 2014.
-
(2014)
J. Med. Syst
, vol.38
, Issue.5
, pp. 1-11
-
-
Wen, F.T.1
Guo, D.2
-
14
-
-
84891518669
-
On the security of two remote user authentication schemes for telecare medical information systems
-
Kim, K.W., and Lee, J.D., On the security of two remote user authentication schemes for telecare medical information systems. J. Med. Syst. 38(5):1–11, 2014.
-
(2014)
J. Med. Syst
, vol.38
, Issue.5
, pp. 1-11
-
-
Kim, K.W.1
Lee, J.D.2
-
15
-
-
84919909125
-
An efficient and robust RSA-based remote user authentication for telecare medical information systems
-
Giri, D., Maitra, T., Amin, R., An efficient and robust RSA-based remote user authentication for telecare medical information systems. J. Med. Syst. 39(1):1–9, 2015.
-
(2015)
J. Med. Syst
, vol.39
, Issue.1
, pp. 1-9
-
-
Giri, D.1
Maitra, T.2
Amin, R.3
-
16
-
-
84919914712
-
Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems
-
Islam, S.K.H., and Khan, M.K., Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems. J. Med. Syst. 38(10):1–16, 2014.
-
(2014)
J. Med. Syst
, vol.38
, Issue.10
, pp. 1-16
-
-
Islam, S.K.H.1
Khan, M.K.2
-
17
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Li, C.T., and Hwang, M.S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1–5, 2010.
-
(2010)
J. Netw. Comput. Appl
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
18
-
-
84904035979
-
An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function
-
Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38(6):27, 2014.
-
(2014)
J. Med. Syst
, vol.38
, Issue.6
, pp. 27
-
-
Das, A.K.1
Goswami, A.2
-
19
-
-
84919904291
-
An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment
-
Maitra, T., and Giri, D., An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment. J. Med. Syst. 38(12):1–19, 2014.
-
(2014)
J. Med. Syst
, vol.38
, Issue.12
, pp. 1-19
-
-
Maitra, T.1
Giri, D.2
-
20
-
-
84883088262
-
A secure biometrics-based authentication scheme for telecare medicine information systems
-
Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(5):1–6, 2013.
-
(2013)
J. Med. Syst
, vol.37
, Issue.5
, pp. 1-6
-
-
Yan, X.1
Li, W.2
Li, P.3
Wang, J.4
Hao, X.5
Gong, P.6
-
21
-
-
84904039251
-
Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems
-
Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M.K., Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems. J. Med.Syst. 38(6):1–12, 2014.
-
(2014)
J. Med.Syst
, vol.38
, Issue.6
, pp. 1-12
-
-
Mishra, D.1
Mukhopadhyay, S.2
Chaturvedi, A.3
Kumari, S.4
Khan, M.K.5
-
22
-
-
84919949740
-
Secure privacy-preserving biometric authentication scheme for telecare medicine information systems
-
Li, X.L., Wen, Q.Y., Li, W.M., Zhang, H., Jin, Z.P., Secure privacy-preserving biometric authentication scheme for telecare medicine information systems. J. Med. Syst. 38(11):1–8, 2014.
-
(2014)
J. Med. Syst
, vol.38
, Issue.11
, pp. 1-8
-
-
Li, X.L.1
Wen, Q.Y.2
Li, W.M.3
Zhang, H.4
Jin, Z.P.5
-
23
-
-
85027949488
-
-
He, D.B., and Wang, D.: Robust biometrics-based authentication scheme for multi-server environment
-
He, D.B., and Wang, D.: Robust biometrics-based authentication scheme for multi-server environment, IEEE. Syst. J. doi:10.1109/JSYST.2014.2301517 (2014)
-
(2014)
IEEE. Syst. J
-
-
-
24
-
-
84881359003
-
A biometric authentication scheme for telecare medicine information systems with nonce
-
Awasthi, A.K., and Srivastava, K., A biometric authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 37(5):1–4, 2013.
-
(2013)
J. Med. Syst
, vol.37
, Issue.5
, pp. 1-4
-
-
Awasthi, A.K.1
Srivastava, K.2
-
25
-
-
84901726882
-
Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce
-
Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M.K., Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38(5): 1–11, 2014.
-
(2014)
J. Med. Syst
, vol.38
, Issue.5
, pp. 1-11
-
-
Mishra, D.1
Mukhopadhyay, S.2
Kumari, S.3
Khan, M.K.4
Chaturvedi, A.5
-
26
-
-
84898905921
-
A user anonymity preserving three-factor authentication scheme for telecare medicine information systems
-
Tan, Z., A user anonymity preserving three-factor authentication scheme for telecare medicine information systems. J. Med. Syst. 38(3):1–9, 2014.
-
(2014)
J. Med. Syst
, vol.38
, Issue.3
, pp. 1-9
-
-
Tan, Z.1
-
27
-
-
84919928059
-
Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems
-
Arshad, H., and Nikooghadam, M., Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(12):1–12, 2014.
-
(2014)
J. Med. Syst
, vol.38
, Issue.12
, pp. 1-12
-
-
Arshad, H.1
Nikooghadam, M.2
-
29
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N., Elliptic curve cryptosystems. Math. Comp. 48:203–209, 1987.
-
(1987)
Math. Comp
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
30
-
-
0025386404
-
A logic of authentication
-
Burrow, M., Abadi, M., Needham, R., A logic of authentication. ACM Trans. Comput. Syst. 8:18–36, 1990.
-
(1990)
ACM Trans. Comput. Syst
, vol.8
, pp. 18-36
-
-
Burrow, M.1
Abadi, M.2
Needham, R.3
-
31
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L., Password authentication with insecure communication. Commun. ACM 24(11):770–772, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
32
-
-
84895056653
-
Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks
-
He, D.B., Zhang, Y.Y., Chen, J.H., Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks. Wirel. Pers. Commun. 74(2):229–243, 2014.
-
(2014)
Wirel. Pers. Commun
, vol.74
, Issue.2
, pp. 229-243
-
-
He, D.B.1
Zhang, Y.Y.2
Chen, J.H.3
-
33
-
-
84876151110
-
Security flaws in a smart card based authentication scheme for multi-server environment
-
He, D.B., and Wu, S.H., Security flaws in a smart card based authentication scheme for multi-server environment. Wirel. Pers. Commun. 70(1):323–329, 2013.
-
(2013)
Wirel. Pers. Commun
, vol.70
, Issue.1
, pp. 323-329
-
-
He, D.B.1
Wu, S.H.2
-
34
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges, T.S., Dabbish, E.A., Sloan, R.H., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.
-
(2002)
IEEE Trans. Comput
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
35
-
-
84939573910
-
Differential power analysis
-
Kocher, P., Jaffe, J., Jun, B., Differential power analysis. Adv. Cryptology CRYPTO’99 LNCS 1666: 388–397, 1999b.
-
(1999)
Adv. Cryptology CRYPTO’99 LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
36
-
-
78149480833
-
Biohashing for securing minutiae template
-
Belguechi, R., Rosenberger, C., Ait-Aoudia, S., Biohashing for securing minutiae template. Int. Conf. Pattern Recognition (ICPR2010),1168–1171, 2010.
-
(2010)
Int. Conf. Pattern Recognition (ICPR2010)
, pp. 1168-1171
-
-
Belguechi, R.1
Rosenberger, C.2
Ait-Aoudia, S.3
-
37
-
-
33750533142
-
An improved biohashing for human authentication
-
Lumini, A., and Nanni, L., An improved biohashing for human authentication. Pattern Recogn. 40(3): 1057–1065, 2007.
-
(2007)
Pattern Recogn
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
38
-
-
69949114528
-
Theoretical framework for constructing matching algorithms in biometric authentication systems
-
Inuma, M., Otsuka, A., Imai, H., Theoretical framework for constructing matching algorithms in biometric authentication systems. Adv. Biometrics 5558:806–815, 2009.
-
(2009)
Adv. Biometrics
, vol.5558
, pp. 806-815
-
-
Inuma, M.1
Otsuka, A.2
Imai, H.3
-
39
-
-
84904035979
-
An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function
-
Das, A.K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38(6):27, 2014.
-
(2014)
J. Med. Syst
, vol.38
, Issue.6
, pp. 27
-
-
Das, A.K.1
Goswami, A.2
|