Related references
Note: Only part of the references are listed.A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
Ashok Kumar Das et al.
JOURNAL OF MEDICAL SYSTEMS (2013)
A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
Ya-Fen Chang et al.
JOURNAL OF MEDICAL SYSTEMS (2013)
A Secure Authentication Scheme for Telecare Medicine Information Systems
Zhen-Yu Wu et al.
JOURNAL OF MEDICAL SYSTEMS (2012)
A More Secure Authentication Scheme for Telecare Medicine Information Systems
He Debiao et al.
JOURNAL OF MEDICAL SYSTEMS (2012)
An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
Hung-Ming Chen et al.
JOURNAL OF MEDICAL SYSTEMS (2012)
Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
A. K. Das
IET INFORMATION SECURITY (2011)
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
Xiong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
An efficient biometrics-based remote user authentication scheme using smart cards
Chun-Ta Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)
Two-Factor User Authentication in Wireless Sensor Networks
Manik Lal Das
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
Muhammad Khurram Khan et al.
CHAOS SOLITONS & FRACTALS (2008)
Two-factor mutual authentication based on smart cards and passwords
Guomin Yang et al.
JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2008)
An improved BioHashing for human authentication
Alessandra Lumini et al.
PATTERN RECOGNITION (2007)
Improved remote authentication scheme with smart card
NY Lee et al.
COMPUTER STANDARDS & INTERFACES (2005)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
ATB Jin et al.
PATTERN RECOGNITION (2004)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)
A new remote user authentication scheme using smart cards
MS Hwang et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2000)