4.6 Article

A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks

Wen-Bin Hsieh et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2014)

Article Health Care Sciences & Services

A Secure Authentication Scheme for Telecare Medicine Information Systems

Zhen-Yu Wu et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

A Password-Based User Authentication Scheme for the Integrated EPR Information System

Zhen-Yu Wu et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

Design and Implementation of a Telecare Information Platform

Shing-Han Li et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

Strong Authentication Scheme for Telecare Medicine Information Systems

Qiong Pu et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

A More Secure Authentication Scheme for Telecare Medicine Information Systems

He Debiao et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

An Efficient Authentication Scheme for Telecare Medicine Information Systems

Zhian Zhu

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

An Improved Authentication Scheme for Telecare Medicine Information Systems

Jianghong Wei et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems

Hung-Ming Chen et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Computer Science, Information Systems

Robust smart-cards-based user authentication scheme with user anonymity

Shuhua Wu et al.

SECURITY AND COMMUNICATION NETWORKS (2012)

Article Computer Science, Information Systems

A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography

Debiao He et al.

SECURITY AND COMMUNICATION NETWORKS (2012)

Article Computer Science, Information Systems

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'

Muhammad Khurram Khan et al.

COMPUTER COMMUNICATIONS (2011)

Article Automation & Control Systems

Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards

Xiangxue Li et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2010)

Article Telecommunications

Weaknesses in an Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks

Taek-Young Youn et al.

IEEE COMMUNICATIONS LETTERS (2009)

Article Computer Science, Information Systems

A cryptographic key management solution for HIPAA privacy/security regulations

Wei-Bin Lee et al.

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2008)

Article Computer Science, Information Systems

Technical guidelines for enhancing privacy and data protection in modern electronic medical environments

S Gritzalis et al.

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2005)