4.6 Article

A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

An improved and provably secure three-factor user authentication scheme for wireless sensor networks

Fan Wu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks

Debiao He et al.

IEEE SYSTEMS JOURNAL (2018)

Article Computer Science, Information Systems

Anonymous Authentication for Wireless Body Area Networks With Provable Security

Debiao He et al.

IEEE SYSTEMS JOURNAL (2017)

Article Computer Science, Information Systems

Security analysis and design of an efficient ECC-based two-factor password authentication scheme

Tanmoy Maitra et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Information Systems

Robust Biometrics-Based Authentication Scheme for Multiserver Environment

Debiao He et al.

IEEE SYSTEMS JOURNAL (2015)

Article Computer Science, Hardware & Architecture

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Ding Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Computer Science, Artificial Intelligence

Alignment-free row-co-occurrence cancelable palmprint Fuzzy Vault

Lu Leng et al.

PATTERN RECOGNITION (2015)

Article Computer Science, Information Systems

An enhanced privacy preserving remote user authentication scheme with provable security

Shehzad Ashraf Chaudhry et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Information Systems

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

Debiao He et al.

MULTIMEDIA SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

Ding Wang et al.

COMPUTER NETWORKS (2014)

Article Computer Science, Information Systems

A Survey of SIP Authentication and Key Agreement Schemes

H. Hakan Kilinc et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Information Systems

A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion

Lu Leng et al.

SECURITY AND COMMUNICATION NETWORKS (2014)

Article Computer Science, Hardware & Architecture

A new efficient authenticated multiple-key exchange protocol from bilinear pairings

Mohammad Sabzinejad Farash et al.

COMPUTERS & ELECTRICAL ENGINEERING (2013)

Article Computer Science, Hardware & Architecture

Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem

Eun-Jun Yoon et al.

JOURNAL OF SUPERCOMPUTING (2013)

Article Engineering, Electrical & Electronic

A new authenticated key agreement for session initiation protocol

Qi Xie

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2012)

Article Computer Science, Artificial Intelligence

An improved BioHashing for human authentication

Alessandra Lumini et al.

PATTERN RECOGNITION (2007)

Article Computer Science, Artificial Intelligence

Biohashing: two factor authentication featuring fingerprint data and tokenised random number

ATB Jin et al.

PATTERN RECOGNITION (2004)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)