4.6 Article

An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Cloud Centric Authentication for Wearable Healthcare Monitoring System

Srinivas Jangirala et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Automation & Control Systems

A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid

Yining Liu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2019)

Article Computer Science, Theory & Methods

A robust and anonymous patient monitoring system using wireless medical sensor networks

Ruhul Amin et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Proceedings Paper Computer Science, Artificial Intelligence

K-SVD WITH A REAL l0 OPTIMIZATION: APPLICATION TO IMAGE DENOISING

Yuan Liu et al.

2018 IEEE 28TH INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP) (2018)

Article Computer Science, Information Systems

A new and secure authentication scheme for wireless sensor networks with formal proof

Fan Wu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2017)

Article Engineering, Electrical & Electronic

A robust ElGamal-based password-authentication protocol using smart card for client-server communication

Tanmoy Maitra et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)

Article Computer Science, Information Systems

Anonymous Authentication for Wireless Body Area Networks With Provable Security

Debiao He et al.

IEEE SYSTEMS JOURNAL (2017)

Article Health Care Sciences & Services

A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System

Prerna Mohit et al.

JOURNAL OF MEDICAL SYSTEMS (2017)

Article Health Care Sciences & Services

A Mutual Authentication Framework for Wireless Medical Sensor Networks

Jangirala Srinivas et al.

JOURNAL OF MEDICAL SYSTEMS (2017)

Article Multidisciplinary Sciences

Computational study and in vitro evaluation of the anti-proliferative activity of novel naproxen derivatives

Abdullah G. Al-Sehemi et al.

JOURNAL OF KING SAUD UNIVERSITY SCIENCE (2017)

Article Computer Science, Hardware & Architecture

A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity

Venkatasamy Sureshkumar et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Multidisciplinary Sciences

Provably Secure Threshold-Based ABE Scheme Without Bilinear Map

Arijit Karati et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2016)

Article Computer Science, Interdisciplinary Applications

Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems

Anil Kumar Sutrala et al.

COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE (2016)

Article Engineering, Electrical & Electronic

An anonymous and provably secure authentication scheme for mobile user

S. K. Hafizul Islam et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2016)

Article Health Care Sciences & Services

A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography

Shehzad Ashraf Chaudhry et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Health Care Sciences & Services

A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data

Prosanta Gope et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Health Care Sciences & Services

Privacy-Preserving and Secure Sharing of PHR in the Cloud

Leyou Zhang et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Multidisciplinary Sciences

Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card

Ruhul Amin et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2015)

Article Computer Science, Information Systems

Robust Biometrics-Based Authentication Scheme for Multiserver Environment

Debiao He et al.

IEEE SYSTEMS JOURNAL (2015)

Article Health Care Sciences & Services

Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems

Shehzad Ashraf Chaudhry et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Computer Science, Information Systems

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

Debiao He et al.

MULTIMEDIA SYSTEMS (2015)

Article Computer Science, Information Systems

An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity

Lili Xu et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Information Systems

An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system

Haomiao Yang et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2015)

Article Health Care Sciences & Services

A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems

Dheerendra Mishra et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems

Dheerendra Mishra et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

Mechanisms for SLA provisioning in cloud-based service providers

Emiliano Casalicchio et al.

COMPUTER NETWORKS (2013)

Article Health Care Sciences & Services

Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'

Saru Kumari et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems

Qi Jiang et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Computer Science, Hardware & Architecture

An enhanced smart card based remote user password authentication scheme

Xiong Li et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2013)

Article Health Care Sciences & Services

A Secure Authentication Scheme for Telecare Medicine Information Systems

Zhen-Yu Wu et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

A Password-Based User Authentication Scheme for the Integrated EPR Information System

Zhen-Yu Wu et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

A More Secure Authentication Scheme for Telecare Medicine Information Systems

He Debiao et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

An Efficient Authentication Scheme for Telecare Medicine Information Systems

Zhian Zhu

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Health Care Sciences & Services

An Improved Authentication Scheme for Telecare Medicine Information Systems

Jianghong Wei et al.

JOURNAL OF MEDICAL SYSTEMS (2012)