A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems
暂无分享,去创建一个
[1] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[2] Fengtong Wen,et al. An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems , 2014, Journal of Medical Systems.
[3] Zhang Rui,et al. A More Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of medical systems.
[4] Han-Yu Lin,et al. On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems , 2013, Journal of Medical Systems.
[5] Yu-Fang Chung,et al. A Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[6] Guomin Yang,et al. A robust smart card-based anonymous user authentication protocol for wireless communications , 2014, Secur. Commun. Networks.
[7] Fan Wu,et al. Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems , 2012, Journal of Medical Systems.
[8] Jian Wang,et al. Strong Authentication Scheme for Telecare Medicine Information Systems , 2011, Journal of Medical Systems.
[9] Rui Zhang,et al. A More Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[10] Tianjie Cao,et al. Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems , 2013, Journal of Medical Systems.
[11] Hung-Ming Chen,et al. An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems , 2012, Journal of Medical Systems.
[12] Dianli Guo,et al. Analysis and Improvement of a Robust Smart Card Based-Authentication Scheme for Multi-Server Architecture , 2014, Wirel. Pers. Commun..
[13] Ashok Kumar Das,et al. An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce Using Chaotic Hash Function , 2014, Journal of Medical Systems.
[14] Ya-Fen Chang,et al. A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care , 2013, Journal of Medical Systems.
[15] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[16] Kenneth G. Paterson,et al. Modular Security Proofs for Key Agreement Protocols , 2005, ASIACRYPT.
[17] Caroline J. Kudla,et al. Special Signature Schemes and Key Agreement Protocols , 2006 .
[18] Wenfen Liu,et al. An Improved Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[19] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[20] Qiaoyan Wen,et al. An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks , 2013, Int. J. Netw. Manag..
[21] Wei-Bin Lee,et al. A Secure Authentication Scheme with Anonymity for Wireless Communications , 2008, IEEE Commun. Lett..
[22] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[23] Fengtong Wen,et al. A Robust Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care , 2013, Journal of Medical Systems.
[24] Cheng-Chi Lee,et al. A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems , 2014, Journal of Medical Systems.
[25] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[26] Jun Zhang,et al. Robust Anonymous Authentication Scheme for Telecare Medical Information Systems , 2013, Journal of Medical Systems.
[27] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[28] Jianfeng Ma,et al. A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems , 2013, Journal of Medical Systems.
[29] Zhenfu Cao,et al. An improved identity-based key agreement protocol and its security proof , 2009, Inf. Sci..
[30] Zhian Zhu,et al. An Efficient Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[31] Chun-Ta Li,et al. A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card , 2013, IET Inf. Secur..
[32] G. P. Biswas,et al. A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem , 2011, J. Syst. Softw..
[33] Zhenguo Zhao,et al. An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem , 2014, Journal of Medical Systems.
[34] Antoine Joux. A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.