Related references
Note: Only part of the references are listed.A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
Ya-Fen Chang et al.
JOURNAL OF MEDICAL SYSTEMS (2013)
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks
Ashok Kumar Das
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2012)
Classification and generation of disturbance vectors for collision attacks against SHA-1
Stephane Manuel
DESIGNS CODES AND CRYPTOGRAPHY (2011)
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
A. K. Das
IET INFORMATION SECURITY (2011)
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
Xiong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
An efficient biometrics-based remote user authentication scheme using smart cards
Chun-Ta Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)
Two-Factor User Authentication in Wireless Sensor Networks
Manik Lal Das
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
Muhammad Khurram Khan et al.
CHAOS SOLITONS & FRACTALS (2008)
An improved BioHashing for human authentication
Alessandra Lumini et al.
PATTERN RECOGNITION (2007)
Improved remote authentication scheme with smart card
NY Lee et al.
COMPUTER STANDARDS & INTERFACES (2005)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
ATB Jin et al.
PATTERN RECOGNITION (2004)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)