4.6 Article

An enhanced lightweight anonymous biometric based authentication scheme for TMIS

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Electrical & Electronic

A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor

Ashok Kumar Das

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)

Article Computer Science, Information Systems

An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC

Hamed Arshad et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2016)

Article Engineering, Electrical & Electronic

Authentication Protocol for an Ambient Assisted Living System

Debiao He et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Editorial Material Computer Science, Information Systems

Telemedicine in the Cloud Era: Prospects and Challenges

Zhanpeng Jin et al.

IEEE PERVASIVE COMPUTING (2015)

Article Computer Science, Hardware & Architecture

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Ding Wang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Health Care Sciences & Services

Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems

Shehzad Ashraf Chaudhry et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Computer Science, Hardware & Architecture

Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol

Hamed Arshad et al.

JOURNAL OF SUPERCOMPUTING (2015)

Article Computer Science, Information Systems

An enhanced privacy preserving remote user authentication scheme with provable security

Shehzad Ashraf Chaudhry et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Information Systems

A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture

Yanrong Lu et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)

Article Health Care Sciences & Services

A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System

Keerti Srivastava et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Computer Science, Information Systems

Remote three-factor authentication scheme based on Fuzzy extractors

Min Zhang et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Hardware & Architecture

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions

Ding Wang et al.

COMPUTER NETWORKS (2014)

Article Computer Science, Artificial Intelligence

An anonymous multi-server authenticated key agreement scheme based on trust computing using smart cards and biometrics

Ming-Chin Chuang et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Artificial Intelligence

A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards

Dheerendra Mishra et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Information Systems

A Survey of SIP Authentication and Key Agreement Schemes

H. Hakan Kilinc et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Engineering, Electrical & Electronic

Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices

Debiao He et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2014)

Article Computer Science, Information Systems

Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards

Jenq-Shiou Leu et al.

IET INFORMATION SECURITY (2014)

Article Health Care Sciences & Services

Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems

Hamed Arshad et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems

Dheerendra Mishra et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Computer Science, Information Systems

A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme

Azeem Irshad et al.

SECURITY AND COMMUNICATION NETWORKS (2014)

Article Health Care Sciences & Services

A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems

Xiaopeng Yan et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce

Amit K. Awasthi et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Computer Science, Interdisciplinary Applications

A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments

Xiong Li et al.

MATHEMATICAL AND COMPUTER MODELLING (2013)

Article Biotechnology & Applied Microbiology

An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

Muhammad Khurram Khan et al.

BIOMED RESEARCH INTERNATIONAL (2013)

Article Computer Science, Hardware & Architecture

An efficient biometrics-based remote user authentication scheme using smart cards

Chun-Ta Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2010)

Article Computer Science, Software Engineering

Efficient utilization of elliptic curve cryptosystem for hierarchical access control

Morteza Nikooghadam et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2010)

Article Computer Science, Information Systems

A new mutual authentication scheme based on nonce and smart cards

Jia-Yong Liu et al.

COMPUTER COMMUNICATIONS (2008)

Article Health Care Sciences & Services

It's the prices, stupid: Why the United States is so different from other countries

GF Anderson et al.

HEALTH AFFAIRS (2003)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)