相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
Lili Xu et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
An improved remote user authentication scheme with key agreement
Saru Kumari et al.
COMPUTERS & ELECTRICAL ENGINEERING (2014)
More efficient key-hash based fingerprint remote authentication scheme using mobile device
Muhammad Khurram Khan et al.
COMPUTING (2014)
Cryptanalysis and improvement of 'a robust smart-card-based remote user password authentication scheme'
Saru Kumari et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2014)
Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
Hamed Arshad et al.
JOURNAL OF MEDICAL SYSTEMS (2014)
A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems
Zuowen Tan
JOURNAL OF MEDICAL SYSTEMS (2014)
An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems
Fengtong Wen et al.
JOURNAL OF MEDICAL SYSTEMS (2014)
On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems
Kee-Won Kim et al.
JOURNAL OF MEDICAL SYSTEMS (2014)
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care
Qi Xie et al.
JOURNAL OF MEDICAL SYSTEMS (2014)
Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems
Xuelei Li et al.
JOURNAL OF MEDICAL SYSTEMS (2014)
Cryptanalysis and Improvement of An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
Muhammad Khurram Khan et al.
SECURITY AND COMMUNICATION NETWORKS (2014)
An improved timestamp-based password authentication scheme: comments, cryptanalysis, and improvement
Saru Kumari et al.
SECURITY AND COMMUNICATION NETWORKS (2014)
More secure smart card-based remote user password authentication scheme with user anonymity
Saru Kumari et al.
SECURITY AND COMMUNICATION NETWORKS (2014)
A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
Ashok Kumar Das et al.
JOURNAL OF MEDICAL SYSTEMS (2013)
On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
Han-Yu Lin
JOURNAL OF MEDICAL SYSTEMS (2013)
Security Analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems
Fan Wu et al.
JOURNAL OF MEDICAL SYSTEMS (2013)
An Authentication Scheme for Secure Access to Healthcare Services
Muhammad Khurram Khan et al.
JOURNAL OF MEDICAL SYSTEMS (2013)
A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
Fengtong Wen
JOURNAL OF MEDICAL SYSTEMS (2013)
Robust Anonymous Authentication Scheme for Telecare Medical Information Systems
Qi Xie et al.
JOURNAL OF MEDICAL SYSTEMS (2013)
Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
Tianjie Cao et al.
JOURNAL OF MEDICAL SYSTEMS (2013)
Cryptanalysis and Improvement of 'A Privacy Enhanced Scheme for Telecare Medical Information Systems'
Saru Kumari et al.
JOURNAL OF MEDICAL SYSTEMS (2013)
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems
Qi Jiang et al.
JOURNAL OF MEDICAL SYSTEMS (2013)
An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
Hung-Ming Chen et al.
JOURNAL OF MEDICAL SYSTEMS (2012)
Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics
Chun-I Fan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)
Random subspace for an improved BioHashing for face authentication
Loris Nanni et al.
PATTERN RECOGNITION LETTERS (2008)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
ATB Jin et al.
PATTERN RECOGNITION (2004)
Examining smart-card security under the threat of power analysis attacks
TS Messerges et al.
IEEE TRANSACTIONS ON COMPUTERS (2002)