A Permissioned Blockchain-Based Identity Management and User Authentication Scheme for E-Health Systems
暂无分享,去创建一个
[1] Muhammad Khurram Khan,et al. Cryptanalysis and Improvement of Authentication and Key Agreement Protocols for Telecare Medicine Information Systems , 2014, Journal of Medical Systems.
[2] Morteza Nikooghadam,et al. Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems , 2014, Journal of Medical Systems.
[3] Loris Nanni,et al. Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..
[4] Ashok Kumar Das. Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication Scheme Using Smart Cards , 2011, ArXiv.
[5] Lixiang Li,et al. An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem , 2015, Journal of Medical Systems.
[6] Roberto Baldoni,et al. PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.
[7] Vitalik Buterin. A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .
[8] Witold Charatonik,et al. On Name Generation and Set-Based Analysis in the Dolev-Yao Model , 2002, CONCUR.
[9] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[10] Fulong Chen,et al. Design of a Secure Medical Data Sharing Scheme Based on Blockchain , 2020, Journal of Medical Systems.
[11] Tsern-Huei Lee,et al. Simple Dynamic User Authentication Protocols for Wireless Sensor Networks , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).
[12] Chun-Hung Liu,et al. Enhancement of Two-Factor User Authentication in Wireless Sensor Networks , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[13] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[14] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[15] Ya-Fen Chang,et al. A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care , 2013, Journal of Medical Systems.
[16] Shekhar Shukla,et al. Blockchain-Powered Smart Healthcare System , 2020 .
[17] Cheng-Chi Lee,et al. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.
[18] Juho Kim,et al. A Security-Performance-Balanced User Authentication Scheme for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[19] Yong Xiang,et al. An Efficient Authentication Scheme for Blockchain-Based Electronic Health Records , 2019, IEEE Access.
[20] Gexiang Zhang,et al. Cloud-assisted secure eHealth systems for tamper-proofing EHR via blockchain , 2019, Inf. Sci..
[21] Gautam Srivastava,et al. Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain , 2020, IEEE Journal of Biomedical and Health Informatics.
[22] Cjf Cas Cremers. Scyther : semantics and verification of security protocols , 2006 .
[23] Wuu Yang,et al. An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[24] Sherali Zeadally,et al. A survey on privacy protection in blockchain system , 2019, J. Netw. Comput. Appl..
[25] Muhammad Khurram Khan,et al. An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity , 2013, BioMed research international.
[26] Xiong Li,et al. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards , 2011, J. Netw. Comput. Appl..
[27] Fan Wu,et al. Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care , 2015, Journal of Medical Systems.
[28] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[29] Liping Zhang,et al. Robust ECC-based Authenticated Key Agreement Scheme with Privacy Protection for Telecare Medicine Information Systems , 2015, Journal of Medical Systems.
[30] Ashok Kumar Das,et al. A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care , 2013, Journal of Medical Systems.
[31] Younghwa An,et al. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards , 2012, Journal of biomedicine & biotechnology.
[32] Yun Peng,et al. Efficient key management scheme for health blockchain , 2018, CAAI Trans. Intell. Technol..
[33] Md. Zakirul Alam Bhuiyan,et al. Privacy-friendly platform for healthcare data in cloud based on blockchain environment , 2019, Future Gener. Comput. Syst..
[34] Joel J. P. C. Rodrigues,et al. Secure Three-Factor User Authentication Scheme for Renewable-Energy-Based Smart Grid Environment , 2017, IEEE Transactions on Industrial Informatics.