Related references
Note: Only part of the references are listed.A robust and anonymous patient monitoring system using wireless medical sensor networks
Ruhul Amin et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network
Debiao He et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)
A robust ElGamal-based password-authentication protocol using smart card for client-server communication
Tanmoy Maitra et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)
Secure Data Access and Sharing Scheme for Cloud Storage
Xiong Li et al.
WIRELESS PERSONAL COMMUNICATIONS (2017)
Anonymous Authentication for Wireless Body Area Networks With Provable Security
Debiao He et al.
IEEE SYSTEMS JOURNAL (2017)
An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments
S. K. Hafizul Islam et al.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2017)
A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity
Venkatasamy Sureshkumar et al.
COMPUTERS & ELECTRICAL ENGINEERING (2017)
Efficient biometric and password based mutual authentication for consumer USB mass storage devices
Debasis Giri et al.
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2016)
Provably Secure Threshold-Based ABE Scheme Without Bilinear Map
Arijit Karati et al.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2016)
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems
Anil Kumar Sutrala et al.
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2016)
A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks
Prosanta Gope et al.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2016)
A Threshold Anonymous Authentication Protocol for VANETs
Jun Shao et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)
An anonymous and provably secure authentication scheme for mobile user
S. K. Hafizul Islam et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2016)
Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment
Shin-Yan Chiou et al.
JOURNAL OF MEDICAL SYSTEMS (2016)
A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography
Shehzad Ashraf Chaudhry et al.
JOURNAL OF MEDICAL SYSTEMS (2016)
A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data
Prosanta Gope et al.
JOURNAL OF MEDICAL SYSTEMS (2016)
Privacy-Preserving and Secure Sharing of PHR in the Cloud
Leyou Zhang et al.
JOURNAL OF MEDICAL SYSTEMS (2016)
Secure Remote Login Scheme with Password and Smart Card Update Facilities
Rajeev Kumar et al.
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015 (2016)
Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card
Ruhul Amin et al.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2015)
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
Debiao He et al.
IEEE SYSTEMS JOURNAL (2015)
Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems
Ruhul Amin et al.
JOURNAL OF MEDICAL SYSTEMS (2015)
Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
Shehzad Ashraf Chaudhry et al.
JOURNAL OF MEDICAL SYSTEMS (2015)
Software testing evolution process model and growth of software testing quality
He ZhiTao et al.
SCIENCE CHINA-INFORMATION SCIENCES (2015)
An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system
Haomiao Yang et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)
A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems
Dheerendra Mishra et al.
JOURNAL OF MEDICAL SYSTEMS (2014)
Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems
Dheerendra Mishra et al.
JOURNAL OF MEDICAL SYSTEMS (2014)
Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'
Saru Kumari et al.
JOURNAL OF MEDICAL SYSTEMS (2013)
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems
Qi Jiang et al.
JOURNAL OF MEDICAL SYSTEMS (2013)
An enhanced smart card based remote user password authentication scheme
Xiong Li et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)
A Secure Authentication Scheme for Telecare Medicine Information Systems
Zhen-Yu Wu et al.
JOURNAL OF MEDICAL SYSTEMS (2012)
A Password-Based User Authentication Scheme for the Integrated EPR Information System
Zhen-Yu Wu et al.
JOURNAL OF MEDICAL SYSTEMS (2012)
A Reliable User Authentication and Key Agreement Scheme for Web-Based Hospital-Acquired Infection Surveillance Information System
Zhen-Yu Wu et al.
JOURNAL OF MEDICAL SYSTEMS (2012)
A More Secure Authentication Scheme for Telecare Medicine Information Systems
He Debiao et al.
JOURNAL OF MEDICAL SYSTEMS (2012)
An Efficient Authentication Scheme for Telecare Medicine Information Systems
Zhian Zhu
JOURNAL OF MEDICAL SYSTEMS (2012)
An Improved Authentication Scheme for Telecare Medicine Information Systems
Jianghong Wei et al.
JOURNAL OF MEDICAL SYSTEMS (2012)