-
1
-
-
84872481143
-
Improved dynamic id-based authentication scheme for telecare medical information systems
-
Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–7, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-7
-
-
Cao, T.1
Zhai, J.2
-
2
-
-
84867867616
-
An efficient and secure dynamic id-based authentication scheme for telecare medical information systems
-
Chen, H.M., Lo, J.W., Yeh, C.K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3907-3915
-
-
Chen, H.M.1
Lo, J.W.2
Yeh, C.K.3
-
3
-
-
84904035979
-
An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function
-
Das, A. K., and Goswami, A., An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function. J. Med. Syst. 38(6):1–27, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.6
, pp. 1-27
-
-
Das, A.K.1
Goswami, A.2
-
4
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He, D., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.1
Jianhua, C.2
Rui, Z.3
-
5
-
-
84905560661
-
On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems
-
Kim, K. W., and Lee, J. D., On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.5
, pp. 1-11
-
-
Kim, K.W.1
Lee, J.D.2
-
6
-
-
84872483621
-
On the security of a dynamic id-based authentication scheme for telecare medical information systems
-
Lin, H.Y., On the security of a dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–5, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-5
-
-
Lin, H.Y.1
-
7
-
-
84911988880
-
Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun
-
Ma, C.G., Wang, D., Zhao, S.D., Security flaws in two improved remote user authentication schemes using smart cards. Int. J. Commun. Syst., 2012. doi: 10.1002/dac.2468.
-
(2012)
Syst.
-
-
Ma, C.G.1
Wang, D.2
Zhao, S.D.3
-
8
-
-
84904039251
-
Cryptanalysis and Improvement of Yan et al.s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems
-
Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and Improvement of Yan et al.s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(6):1–12, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.6
, pp. 1-12
-
-
Mishra, D.1
Mukhopadhyay, S.2
Chaturvedi, A.3
Kumari, S.4
Khan, M.K.5
-
9
-
-
84901726882
-
Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce
-
Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., Chaturvedi, A., Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Med. Syst. 38(5):1–11, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.5
, pp. 1-11
-
-
Mishra, D.1
Mukhopadhyay, S.2
Kumari, S.3
Khan, M.K.4
Chaturvedi, A.5
-
10
-
-
84898905921
-
A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems
-
Tan, Z., A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 38(3):1–9, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.3
, pp. 1-9
-
-
Tan, Z.1
-
11
-
-
84868139535
-
Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards
-
Wang, D., and Ma, C.g., Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards. The Journal of China Universities of Posts and Telecommunications 19(5):104–114, 2012.
-
(2012)
The Journal of China Universities of Posts and Telecommunications
, vol.19
, Issue.5
, pp. 104-114
-
-
Wang, D.1
Ma, C.2
-
12
-
-
84901208308
-
Robust Smart Card Based Password Authentication Scheme Against Smart Card Security Breach. Cryptology ePrint Archive
-
Wang, D., Ma, C. G., Wang, P., Chen, Z.: Robust Smart Card Based Password Authentication Scheme Against Smart Card Security Breach. Cryptology ePrint Archive, Report 2012/439 (2012). http://eprint.iacr.org/2012/439.pdf
-
(2012)
Report
, vol.439
-
-
Wang, D.1
Ma, C.G.2
Wang, P.3
Chen, Z.4
-
13
-
-
84864344507
-
-
Berlin, Springer-Verlag:
-
Wang, D., Ma, C.g., Wu, P., Secure password-based remote user authentication scheme with non-tamper resistant smart cards. Proceedings of the 26th Annual IFIP Conference on Data and Applications Security and Privacy (IFIP DBSec 2012), Paris, France, July 13-16, LNCS 7371, pp. 114–121. Springer-Verlag: Berlin, 2012.
-
(2012)
Secure password-based remote user authentication scheme with non-tamper resistant smart cards. Proceedings of the 26th Annual IFIP Conference on Data and Applications Security and Privacy (IFIP DBSec 2012), Paris, France, July 13-16, LNCS 7371
, pp. 114-121
-
-
Wang, D.1
Ma, C.2
Wu, P.3
-
14
-
-
84905560414
-
An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems
-
Wen, F., and Guo, D., An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems. J. Med. Syst. 38(5):1–11, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.5
, pp. 1-11
-
-
Wen, F.1
Guo, D.2
-
15
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3597-3604
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
16
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.3
, pp. 1529-1535
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
17
-
-
84872120335
-
Robust anonymous authentication scheme for telecare medical information systems
-
Xie, Q., Zhang, J., Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–8, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-8
-
-
Xie, Q.1
Zhang, J.2
Dong, N.3
-
18
-
-
84867843422
-
An efficient authentication scheme for telecare medicine information systems
-
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.
-
(2012)
J. Med. Syst.
, vol.36
, Issue.6
, pp. 3833-3838
-
-
Zhu, Z.1
-
19
-
-
84891784504
-
A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems
-
Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):1–7, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.1
, pp. 1-7
-
-
Xu, X.1
Zhu, P.2
Wen, Q.3
Jin, Z.4
Zhang, H.5
He, L.6
-
20
-
-
84872108080
-
A privacy enhanced authentication scheme for telecare medical information systems
-
Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.1
, pp. 1-8
-
-
Jiang, Q.1
Ma, J.2
Ma, Z.3
Li, G.4
-
21
-
-
84875510914
-
A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System
-
Lee, T.F., Chang, I.P., Lin, T.H., Wang, C.C., A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System. J. Med. Syst. 37(3):1–7, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.3
, pp. 1-7
-
-
Lee, T.F.1
Chang, I.P.2
Lin, T.H.3
Wang, C.C.4
-
22
-
-
84886912082
-
A privacy–friendly architecture for future cloud computing
-
Petrlic, R., Sekula, S., Sorge, C., A privacy–friendly architecture for future cloud computing. International Journal of Grid and Utility Computing 4(4):265–277, 2013.
-
(2013)
International Journal of Grid and Utility Computing
, vol.4
, Issue.4
, pp. 265-277
-
-
Petrlic, R.1
Sekula, S.2
Sorge, C.3
-
23
-
-
41149155794
-
Mobile privacy in wireless networks-revisited
-
Tang, C., and Wu, D.O., Mobile privacy in wireless networks-revisited. IEEE Transactions on Wireless Communications 7(3):1035–1042, 2008.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.3
, pp. 1035-1042
-
-
Tang, C.1
Wu, D.O.2
-
24
-
-
84872373047
-
Chaotic maps-based password-authenticated key agreement using smart cards
-
Guo, C., and Chang, C.C., Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6):1433–1440, 2013.
-
(2013)
Commun. Nonlinear Sci. Numer. Simul.
, vol.18
, Issue.6
, pp. 1433-1440
-
-
Guo, C.1
Chang, C.C.2
-
25
-
-
84872265840
-
A chaotic map-based authentication scheme for telecare medicine information systems
-
Hao, X., Wang, J., Yang, Q., Yan, X., Li, P., A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2):1–7, 2013.
-
(2013)
J. Med. Syst.
, vol.37
, Issue.2
, pp. 1-7
-
-
Hao, X.1
Wang, J.2
Yang, Q.3
Yan, X.4
Li, P.5
-
26
-
-
84893187211
-
Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems
-
Jiang, Q., Ma, J., Lu, X., Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):1–8, 2014.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.2
, pp. 1-8
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
27
-
-
0010495236
-
Correlational properties of chebyshev chaotic sequences
-
Kohda, T., Tsuneda, A., Lawrance, A.J., Correlational properties of chebyshev chaotic sequences. J. Time Ser. Anal. 21(2):181–191, 2000.
-
(2000)
J. Time Ser. Anal.
, vol.21
, Issue.2
, pp. 181-191
-
-
Kohda, T.1
Tsuneda, A.2
Lawrance, A.J.3
-
28
-
-
0027650105
-
Pseudonoise sequences by chaotic nonlinear maps and their correlation properties
-
Kohda, T., and Tsuneda, A., Pseudonoise sequences by chaotic nonlinear maps and their correlation properties. IEICE Trans. Commun. 76(8):855–862, 1993.
-
(1993)
IEICE Trans. Commun.
, vol.76
, Issue.8
, pp. 855-862
-
-
Kohda, T.1
Tsuneda, A.2
-
29
-
-
23144460039
-
Security of public-key cryptosystems based on chebyshev polynomials
-
Bergamo, P., D’Arco, P., De Santis, A., Kocarev, L., Security of public-key cryptosystems based on chebyshev polynomials. IEEE Transactions on Circuits and Systems 52(7):1382–1393, 2005.
-
(2005)
IEEE Transactions on Circuits and Systems
, vol.52
, Issue.7
, pp. 1382-1393
-
-
Bergamo, P.1
D’Arco, P.2
De Santis, A.3
Kocarev, L.4
-
30
-
-
33751227507
-
A novel key agreement protocol based on chaotic maps
-
Xiao, D., Liao, X., Deng, S., A novel key agreement protocol based on chaotic maps. Inf. Sci. 177(4):1136–1142, 2007.
-
(2007)
Inf. Sci.
, vol.177
, Issue.4
, pp. 1136-1142
-
-
Xiao, D.1
Liao, X.2
Deng, S.3
-
32
-
-
0000523051
-
A logic of authentication. Proceedings of the Royal Society of London. A
-
Burrows, M., Abadi, M., Needham, R.M., A logic of authentication. Proceedings of the Royal Society of London. A. Math. Phys. Sci. 426(1871):233–271, 1989.
-
(1989)
Math. Phys. Sci.
, vol.426
, Issue.1871
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
|