Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care
暂无分享,去创建一个
[1] Yuhua Lin,et al. Cryptanalysis and Security Improvement of Two Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor Networks , 2020, Secur. Commun. Networks.
[2] Fadi Al-Turjman,et al. Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks , 2017, IEEE Access.
[3] Robert H. Deng,et al. A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[4] Saru Kumari,et al. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.
[5] Preeti Chandrakar. A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks , 2019, Int. J. Ambient Comput. Intell..
[6] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[7] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[8] R. Madhusudhan,et al. Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET , 2020, Peer-to-Peer Netw. Appl..
[9] Moayad Aloqaily,et al. An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.
[10] Hongfeng Zhu,et al. An Effcient Authenticated Key Agreement Protocol Based on Chaotic Maps with Privacy Protection using Smart Card , 2015, J. Inf. Hiding Multim. Signal Process..
[11] Thar Baker,et al. An Edge Computing Based Smart Healthcare Framework for Resource Management , 2018, Sensors.
[12] Yong Yu,et al. Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage , 2017, IEEE Transactions on Information Forensics and Security.
[13] Jianfeng Ma,et al. A privacy preserving three-factor authentication protocol for e-Health clouds , 2016, The Journal of Supercomputing.
[14] Ashok Kumar Das,et al. An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System , 2013, Journal of Medical Systems.
[15] Jing Chen,et al. Secure and Lightweight Authentication With Key Agreement for Smart Wearable Systems , 2020, IEEE Internet of Things Journal.
[16] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[17] Laurence T. Yang,et al. Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing , 2015, IEEE Transactions on Parallel and Distributed Systems.
[18] Ashok Kumar Das,et al. Lightweight and Physically Secure Anonymous Mutual Authentication Protocol for Real-Time Data Access in Industrial Wireless Sensor Networks , 2019, IEEE Transactions on Industrial Informatics.
[19] Chun-Ta Li,et al. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. , 2018, Computer methods and programs in biomedicine.
[20] Guoai Xu,et al. A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map , 2019, IEEE Access.
[21] Elisa Bertino,et al. PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones , 2018, IEEE Transactions on Information Forensics and Security.
[22] Min-Shiang Hwang,et al. Security enhancement for the timestamp-based password authentication scheme using smart cards , 2003, Comput. Secur..
[23] Wei-Kuan Shih,et al. A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .
[24] Lili Wang. Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography , 2014, J. Appl. Math..
[25] Sungyoung Lee,et al. An Efficient Mutual Authentication and Access Control Scheme for Wireless Sensor Networks in Healthcare , 2011, J. Networks.
[26] Wei Liang,et al. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.
[27] Dharminder Dharminder,et al. Security analysis and application of Chebyshev Chaotic map in the authentication protocols , 2019, International Journal of Computers and Applications.
[28] Tie Qiu,et al. Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things , 2017, IEEE Internet of Things Journal.
[29] Rajappa Muthaiah,et al. Analyzing three-party authentication and key agreement protocol for real time IP multimedia server–client systems , 2015, Multimedia Tools and Applications.
[30] Lawrence C. Stewart,et al. HTTP Authentication: Basic and Digest Access Authentication , 1999 .
[31] Rajappa Muthaiah,et al. Evaluating Three Party Authentication and Key Agreement Protocols Using IP Multimedia Server–Client Systems , 2015, Wirel. Pers. Commun..
[32] Deebak Bakkiam David,et al. A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System , 2015 .
[33] Ashish Singh,et al. An Enhanced Authentication Scheme for Internet of Things Based E-Healthcare System , 2020 .
[34] Guoai Xu,et al. A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure , 2020, Wirel. Commun. Mob. Comput..
[35] Xiaotie Deng,et al. Two-factor mutual authentication based on smart cards and passwords , 2008, J. Comput. Syst. Sci..
[36] Hong Liu,et al. Cooperative Privacy Preservation for Wearable Devices in Hybrid Computing-Based Smart Health , 2019, IEEE Internet of Things Journal.
[37] Moayad Aloqaily,et al. A smart healthcare reward model for resource allocation in smart city , 2018, Multimedia Tools and Applications.
[38] Tanmoy Maitra,et al. Cryptanalysis and Improvement of an RSA Based Remote User Authentication Scheme Using Smart Card , 2017, Wirel. Pers. Commun..
[39] Sourav Mukhopadhyay,et al. A Mutual Authentication Framework for Wireless Medical Sensor Networks , 2017, Journal of Medical Systems.
[40] Vanga Odelu,et al. An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card , 2015, J. Inf. Secur. Appl..
[41] R. C. Mittal,et al. An improved timestamp-based remote user authentication scheme , 2011, Comput. Electr. Eng..
[42] Deebak Bakkiam David. Mutual authentication scheme for multimedia medical information systems , 2017 .
[43] Fan Wu,et al. Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems , 2012, Journal of Medical Systems.
[44] Adesh Kumari,et al. A secure user authentication protocol using elliptic curve cryptography , 2019 .
[45] Xiong Li,et al. A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems , 2020, IEEE Systems Journal.