4.6 Article

A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care

Related references

Note: Only part of the references are listed.
Article Health Care Sciences & Services

A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care

Ya-Fen Chang et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Computer Science, Information Systems

A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks

Ashok Kumar Das

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2012)

Article Computer Science, Theory & Methods

Classification and generation of disturbance vectors for collision attacks against SHA-1

Stephane Manuel

DESIGNS CODES AND CRYPTOGRAPHY (2011)

Article Computer Science, Information Systems

Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards

A. K. Das

IET INFORMATION SECURITY (2011)

Article Computer Science, Hardware & Architecture

Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Hardware & Architecture

An efficient biometrics-based remote user authentication scheme using smart cards

Chun-Ta Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)

Article Engineering, Electrical & Electronic

Two-Factor User Authentication in Wireless Sensor Networks

Manik Lal Das

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Mathematics, Interdisciplinary Applications

Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices

Muhammad Khurram Khan et al.

CHAOS SOLITONS & FRACTALS (2008)

Article Computer Science, Artificial Intelligence

An improved BioHashing for human authentication

Alessandra Lumini et al.

PATTERN RECOGNITION (2007)

Article Computer Science, Hardware & Architecture

Improved remote authentication scheme with smart card

NY Lee et al.

COMPUTER STANDARDS & INTERFACES (2005)

Article Computer Science, Artificial Intelligence

Biohashing: two factor authentication featuring fingerprint data and tokenised random number

ATB Jin et al.

PATTERN RECOGNITION (2004)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)