4.6 Article

A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care

Related references

Note: Only part of the references are listed.
Article Health Care Sciences & Services

A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care

Ashok Kumar Das et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care

Ya-Fen Chang et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

A Secure Authentication Scheme for Telecare Medicine Information Systems

Zhen-Yu Wu et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

A More Secure Authentication Scheme for Telecare Medicine Information Systems

He Debiao et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems

Hung-Ming Chen et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Computer Science, Information Systems

Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards

A. K. Das

IET INFORMATION SECURITY (2011)

Article Computer Science, Hardware & Architecture

Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Hardware & Architecture

An efficient biometrics-based remote user authentication scheme using smart cards

Chun-Ta Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)

Article Engineering, Electrical & Electronic

Two-Factor User Authentication in Wireless Sensor Networks

Manik Lal Das

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Mathematics, Interdisciplinary Applications

Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices

Muhammad Khurram Khan et al.

CHAOS SOLITONS & FRACTALS (2008)

Article Computer Science, Hardware & Architecture

Two-factor mutual authentication based on smart cards and passwords

Guomin Yang et al.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2008)

Article Computer Science, Artificial Intelligence

An improved BioHashing for human authentication

Alessandra Lumini et al.

PATTERN RECOGNITION (2007)

Article Computer Science, Hardware & Architecture

Improved remote authentication scheme with smart card

NY Lee et al.

COMPUTER STANDARDS & INTERFACES (2005)

Article Computer Science, Artificial Intelligence

Biohashing: two factor authentication featuring fingerprint data and tokenised random number

ATB Jin et al.

PATTERN RECOGNITION (2004)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)

Article Engineering, Electrical & Electronic

A new remote user authentication scheme using smart cards

MS Hwang et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2000)