4.2 Article

An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring

Rifaqat Ali et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A robust and anonymous patient monitoring system using wireless medical sensor networks

Ruhul Amin et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Engineering, Electrical & Electronic

An extended ECC-based anonymity-preserving 3-factor remote authentication scheme usable in TMIS

Preeti Chandrakar et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2018)

Article Computer Science, Hardware & Architecture

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Multidisciplinary Sciences

Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System

Rifaqat Ali et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2018)

Article Multidisciplinary Sciences

An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem

Preeti Chandrakar et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2018)

Article Computer Science, Information Systems

AnonPri: A secure anonymous private authentication protocol for RFID systems

Farzana Rahman et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Hardware & Architecture

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment

Fan Wu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Hardware & Architecture

A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server

Fan Wu et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Computer Science, Information Systems

A secure and robust anonymous three-factor remote user authentication scheme for multi-server environment using ECC

Preeti Chandrakar et al.

COMPUTER COMMUNICATIONS (2017)

Article Computer Science, Hardware & Architecture

Secure user authentication scheme for wireless healthcare sensor networks

Chia-Hui Liu et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Computer Science, Information Systems

A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem

Rifaqat Ali et al.

INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING (2017)

Article Computer Science, Information Systems

Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment

Preeti Chandrakar et al.

INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING (2017)

Article Multidisciplinary Sciences

Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment

Preeti Chandrakar et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2017)

Article Computer Science, Information Systems

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity

Xiong Li et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Interdisciplinary Applications

Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems

Anil Kumar Sutrala et al.

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2016)

Article Computer Science, Hardware & Architecture

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

Ruhul Amin et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Information Systems

Strongly secure identity-based authenticated key agreement protocols without bilinear pairings

Liang Ni et al.

INFORMATION SCIENCES (2016)

Article Computer Science, Information Systems

A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme

Preeti Chandrakar et al.

INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING (2016)

Article Computer Science, Hardware & Architecture

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Ding Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Computer Science, Information Systems

A novel authenticated encryption scheme and its extension

Jianhong Zhang et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Information Systems

Certificate less one-pass and two-party authenticated key agreement protocol and its extensions

Lei Zhang

INFORMATION SCIENCES (2015)

Article Computer Science, Information Systems

Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity

Ding Wang et al.

INFORMATION SCIENCES (2015)

Article Computer Science, Information Systems

Enhancing the security of password authenticated key agreement protocols based on chaotic maps

Tian-Fu Lee

INFORMATION SCIENCES (2015)

Article Computer Science, Information Systems

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

Debiao He et al.

MULTIMEDIA SYSTEMS (2015)

Article Computer Science, Information Systems

Provably secure proxy convertible authenticated encryption scheme based on RSA

Tzong-Sun Wu et al.

INFORMATION SCIENCES (2014)

Article Telecommunications

Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture

Jianghong Wei et al.

WIRELESS PERSONAL COMMUNICATIONS (2014)

Article Telecommunications

An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks

Qi Jiang et al.

WIRELESS PERSONAL COMMUNICATIONS (2014)

Article Computer Science, Information Systems

An Improved User Authentication Protocol for Healthcare Services via Wireless Medical Sensor Networks

Muhammad Khurram Khan et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2014)

Article Computer Science, Information Systems

Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards

A. K. Das

IET INFORMATION SECURITY (2011)

Article Computer Science, Hardware & Architecture

An efficient anonymous authentication protocol for mobile pay-TV

Tien-Ho Chen et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Hardware & Architecture

Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)

Article Computer Science, Hardware & Architecture

An efficient biometrics-based remote user authentication scheme using smart cards

Chun-Ta Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)