-
1
-
-
84904272742
-
A secure medical data exchange protocol based on cloud environments
-
Chen, C.L., Yang, T.T., Shih, T.F.: A secure medical data exchange protocol based on cloud environments. J. Med. Syst. 38, 112 (2014)
-
(2014)
J. Med. Syst
, vol.38
, pp. 112
-
-
Chen, C.L.1
Yang, T.T.2
Shih, T.F.3
-
2
-
-
84883733928
-
A study of attribute-based proxy reencryption scheme in cloud environments
-
Chung, P.S., Liu, C.W., Hwang, M.S.: A study of attribute-based proxy reencryption scheme in cloud environments. Int. J. Netw. Secur. 16(1), 1-13 (2014)
-
(2014)
Int. J. Netw. Secur
, vol.16
, Issue.1
, pp. 1-13
-
-
Chung, P.S.1
Liu, C.W.2
Hwang, M.S.3
-
3
-
-
84872265840
-
A chaotic map-based authentication scheme for telecare medicine information systems
-
Hao, X., Wang, J., Yang, Q., Yan, X., Li, P.: A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2), 9919 (2013)
-
(2013)
J. Med. Syst
, vol.37
, Issue.2
, pp. 9919
-
-
Hao, X.1
Wang, J.2
Yang, Q.3
Yan, X.4
Li, P.5
-
4
-
-
84951941478
-
-
Accessed 18 April 2015
-
HAVO. http://www.hvc.com.tw/lang/HAVO-E/Home%20HAVO.html. Accessed 18 April 2015
-
HAVO
-
-
-
5
-
-
84864058187
-
A more secure authentication scheme for telecare medicine information systems
-
He, D., Chen, J., Zhang, R.: A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3), 1989-1995 (2012)
-
(2012)
J. Med. Syst
, vol.36
, Issue.3
, pp. 1989-1995
-
-
He, D.1
Chen, J.2
Zhang, R.3
-
6
-
-
84911167162
-
A novel group key transfer for big data security
-
Hsu, C., Zeng, B., Zhang, M.: A novel group key transfer for big data security. Appl. Math. Comput. 249(15), 436-443 (2014)
-
(2014)
Appl. Math. Comput
, vol.249
, Issue.15
, pp. 436-443
-
-
Hsu, C.1
Zeng, B.2
Zhang, M.3
-
7
-
-
84872108080
-
A privacy enhanced authentication scheme for telecare medical information systems
-
Jiang, Q., Ma, J., Ma, Z., Li, G.: A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37, 9897 (2013)
-
(2013)
J. Med. Syst
, vol.37
, pp. 9897
-
-
Jiang, Q.1
Ma, J.2
Ma, Z.3
Li, G.4
-
8
-
-
84893187211
-
Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems
-
Jiang, Q., Ma, J., Lu, X., Tian, Y.: Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2), 12 (2014)
-
(2014)
J. Med. Syst
, vol.38
, Issue.2
, pp. 12
-
-
Jiang, Q.1
Ma, J.2
Lu, X.3
Tian, Y.4
-
9
-
-
84883251252
-
Cryptanalysis and improvement of 'A privacy enhanced scheme for telecare medical information systems
-
Kumari, S., Khan, M.K., Kumar, R.: Cryptanalysis and improvement of 'A privacy enhanced scheme for telecare medical information systems. J. Med. Syst. 37, 9952 (2013)
-
(2013)
J. Med. Syst
, vol.37
, pp. 9952
-
-
Kumari, S.1
Khan, M.K.2
Kumar, R.3
-
10
-
-
84881510395
-
A survey on attribute-based encryption schemes of access control in cloud environments
-
Lee, C.C., Chung, P.S., Hwang, M.S.: A survey on attribute-based encryption schemes of access control in cloud environments. Int. J. Netw. Secur. 15(4), 231- 240 (2013)
-
(2013)
Int. J. Netw. Secur
, vol.15
, Issue.4
, pp. 231-240
-
-
Lee, C.C.1
Chung, P.S.2
Hwang, M.S.3
-
11
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Li, C.T., Hwang, M.S.: An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1), 1-5 (2010)
-
(2010)
J. Netw. Comput. Appl
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
12
-
-
84873444280
-
An extended multi-server-based user authentication and key agreement scheme with user anonymity
-
Li, C.T., Lee, C.C., Weng, C.Y., Fan, C.I.: An extended multi-server-based user authentication and key agreement scheme with user anonymity. KSII Trans. Internet Inf. Syst. 7(1), 119-131 (2013)
-
(2013)
KSII Trans. Internet Inf. Syst
, vol.7
, Issue.1
, pp. 119-131
-
-
Li, C.T.1
Lee, C.C.2
Weng, C.Y.3
Fan, C.I.4
-
13
-
-
84888642495
-
An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
-
Li, C.T., Lee, C.C., Weng, C.Y.: An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74(4), 1133-1143 (2013)
-
(2013)
Nonlinear Dyn
, vol.74
, Issue.4
, pp. 1133-1143
-
-
Li, C.T.1
Lee, C.C.2
Weng, C.Y.3
-
14
-
-
84877844458
-
A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
-
Li, C.T.: A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf. Secur. 7(1), 3-10 (2013)
-
(2013)
IET Inf. Secur
, vol.7
, Issue.1
, pp. 3-10
-
-
Li, C.T.1
-
15
-
-
84891518669
-
A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
-
Li, C.T., Lee, C.C.,Weng, C.Y.: A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38(9), 1-11 (2014)
-
(2014)
J. Med. Syst
, vol.38
, Issue.9
, pp. 1-11
-
-
Li, C.T.1
Lee, C.C.2
Weng, C.Y.3
-
16
-
-
84939958429
-
An extended chaotic maps based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services
-
Li, C.T., Lee, C.W., Shen, J.J.: An extended chaotic maps based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dyn. 80(3), 1601-1611 (2015)
-
(2015)
Nonlinear Dyn
, vol.80
, Issue.3
, pp. 1601-1611
-
-
Li, C.T.1
Lee, C.W.2
Shen, J.J.3
-
17
-
-
84935850541
-
A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems
-
Li, C.T., Weng, C.Y., Lee, C.C.: A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems. J. Med. Syst. 39(8), 1-8 (2015)
-
(2015)
J. Med. Syst
, vol.39
, Issue.8
, pp. 1-8
-
-
Li, C.T.1
Weng, C.Y.2
Lee, C.C.3
-
18
-
-
84939146085
-
Secure user authentication and user anonymity scheme based on quadratic residues for the integrated EPRIS
-
Li, C.T., Weng, C.Y., Lee, C.C., Wang, C.C.: Secure user authentication and user anonymity scheme based on quadratic residues for the integrated EPRIS. Procedia Comput. Sci. 52, 21-28 (2015)
-
(2015)
Procedia Comput. Sci
, vol.52
, pp. 21-28
-
-
Li, C.T.1
Weng, C.Y.2
Lee, C.C.3
Wang, C.C.4
-
20
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1-11 (2011)
-
(2011)
J. Netw. Comput. Appl
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
21
-
-
84935442590
-
Fault-tolerant verifiable keyword symmetric searchable encryption in hybrid cloud
-
Wang, J., Yu, X., Zhao, M.: Fault-tolerant verifiable keyword symmetric searchable encryption in hybrid cloud. Int. J. Netw. Secur. 17(4), 471-483 (2015)
-
(2015)
Int. J. Netw. Secur
, vol.17
, Issue.4
, pp. 471-483
-
-
Wang, J.1
Yu, X.2
Zhao, M.3
-
22
-
-
84867869987
-
An improved authentication scheme for telecare medicine information systems
-
Wei, J., Hu, X., Liu, W.: An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6), 3597-3604 (2012)
-
(2012)
J. Med. Syst
, vol.36
, Issue.6
, pp. 3597-3604
-
-
Wei, J.1
Hu, X.2
Liu, W.3
-
23
-
-
84864061174
-
A secure authentication scheme for telecare medicine information systems
-
Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y.: A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3), 1529-1535 (2012)
-
(2012)
J. Med. Syst
, vol.36
, Issue.3
, pp. 1529-1535
-
-
Wu, Z.Y.1
Lee, Y.C.2
Lai, F.3
Lee, H.C.4
Chung, Y.5
-
24
-
-
79959557055
-
Addressing cloud computing security issues
-
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583-592 (2012)
-
(2012)
Future Gener. Comput. Syst
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
-
25
-
-
84867843422
-
An efficient authentication scheme for telecare medicine information systems
-
Zhu, Z.: An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6), 3833-3838 (2012)
-
(2012)
J. Med. Syst
, vol.36
, Issue.6
, pp. 3833-3838
-
-
Zhu, Z.1
|