4.6 Article

A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

A robust and anonymous patient monitoring system using wireless medical sensor networks

Ruhul Amin et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Hardware & Architecture

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network

Debiao He et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Engineering, Electrical & Electronic

A robust ElGamal-based password-authentication protocol using smart card for client-server communication

Tanmoy Maitra et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)

Article Telecommunications

Secure Data Access and Sharing Scheme for Cloud Storage

Xiong Li et al.

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Computer Science, Information Systems

Anonymous Authentication for Wireless Body Area Networks With Provable Security

Debiao He et al.

IEEE SYSTEMS JOURNAL (2017)

Article Computer Science, Information Systems

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

S. K. Hafizul Islam et al.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2017)

Article Computer Science, Hardware & Architecture

A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity

Venkatasamy Sureshkumar et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Engineering, Electrical & Electronic

Efficient biometric and password based mutual authentication for consumer USB mass storage devices

Debasis Giri et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2016)

Article Multidisciplinary Sciences

Provably Secure Threshold-Based ABE Scheme Without Bilinear Map

Arijit Karati et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2016)

Article Computer Science, Interdisciplinary Applications

Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems

Anil Kumar Sutrala et al.

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2016)

Article Automation & Control Systems

A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks

Prosanta Gope et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2016)

Article Engineering, Electrical & Electronic

A Threshold Anonymous Authentication Protocol for VANETs

Jun Shao et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Engineering, Electrical & Electronic

An anonymous and provably secure authentication scheme for mobile user

S. K. Hafizul Islam et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2016)

Article Health Care Sciences & Services

Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment

Shin-Yan Chiou et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Health Care Sciences & Services

A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography

Shehzad Ashraf Chaudhry et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Health Care Sciences & Services

A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data

Prosanta Gope et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Health Care Sciences & Services

Privacy-Preserving and Secure Sharing of PHR in the Cloud

Leyou Zhang et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Proceedings Paper Computer Science, Artificial Intelligence

Secure Remote Login Scheme with Password and Smart Card Update Facilities

Rajeev Kumar et al.

PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2015 (2016)

Article Multidisciplinary Sciences

Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card

Ruhul Amin et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2015)

Article Computer Science, Information Systems

Robust Biometrics-Based Authentication Scheme for Multiserver Environment

Debiao He et al.

IEEE SYSTEMS JOURNAL (2015)

Article Health Care Sciences & Services

Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems

Shehzad Ashraf Chaudhry et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Computer Science, Information Systems

Software testing evolution process model and growth of software testing quality

He ZhiTao et al.

SCIENCE CHINA-INFORMATION SCIENCES (2015)

Article Computer Science, Information Systems

An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system

Haomiao Yang et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Article Health Care Sciences & Services

A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems

Dheerendra Mishra et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems

Dheerendra Mishra et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'

Saru Kumari et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems

Qi Jiang et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Computer Science, Hardware & Architecture

An enhanced smart card based remote user password authentication scheme

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Health Care Sciences & Services

A Secure Authentication Scheme for Telecare Medicine Information Systems

Zhen-Yu Wu et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

A Password-Based User Authentication Scheme for the Integrated EPR Information System

Zhen-Yu Wu et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

A More Secure Authentication Scheme for Telecare Medicine Information Systems

He Debiao et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

An Efficient Authentication Scheme for Telecare Medicine Information Systems

Zhian Zhu

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

An Improved Authentication Scheme for Telecare Medicine Information Systems

Jianghong Wei et al.

JOURNAL OF MEDICAL SYSTEMS (2012)