4.6 Article

Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity

Lili Xu et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Computer Science, Hardware & Architecture

An improved remote user authentication scheme with key agreement

Saru Kumari et al.

COMPUTERS & ELECTRICAL ENGINEERING (2014)

Article Computer Science, Theory & Methods

More efficient key-hash based fingerprint remote authentication scheme using mobile device

Muhammad Khurram Khan et al.

COMPUTING (2014)

Article Engineering, Electrical & Electronic

Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'

Saru Kumari et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)

Article Health Care Sciences & Services

Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems

Hamed Arshad et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems

Zuowen Tan

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems

Fengtong Wen et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems

Kee-Won Kim et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care

Qi Xie et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems

Xuelei Li et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Computer Science, Information Systems

Cryptanalysis and Improvement of An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems

Muhammad Khurram Khan et al.

SECURITY AND COMMUNICATION NETWORKS (2014)

Article Computer Science, Information Systems

An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement

Saru Kumari et al.

SECURITY AND COMMUNICATION NETWORKS (2014)

Article Computer Science, Information Systems

More secure smart card-based remote user password authentication scheme with user anonymity

Saru Kumari et al.

SECURITY AND COMMUNICATION NETWORKS (2014)

Article Health Care Sciences & Services

A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care

Ashok Kumar Das et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems

Han-Yu Lin

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

Security Analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems

Fan Wu et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

An Authentication Scheme for Secure Access to Healthcare Services

Muhammad Khurram Khan et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care

Fengtong Wen

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

Robust Anonymous Authentication Scheme for Telecare Medical Information Systems

Qi Xie et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems

Tianjie Cao et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'

Saru Kumari et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems

Qi Jiang et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Health Care Sciences & Services

An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems

Hung-Ming Chen et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Computer Science, Theory & Methods

Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics

Chun-I Fan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)

Article Computer Science, Artificial Intelligence

Random subspace for an improved BioHashing for face authentication

Loris Nanni et al.

PATTERN RECOGNITION LETTERS (2008)

Article Computer Science, Artificial Intelligence

Biohashing: two factor authentication featuring fingerprint data and tokenised random number

ATB Jin et al.

PATTERN RECOGNITION (2004)

Article Computer Science, Hardware & Architecture

Examining smart-card security under the threat of power analysis attacks

TS Messerges et al.

IEEE TRANSACTIONS ON COMPUTERS (2002)