Secure Identity Authentication of Community Medical Internet of Things
暂无分享,去创建一个
Hui Sun | Fulong Chen | Chuanxin Zhao | Taochun Wang | Cheng Huang | Xu Cheng | Ziyang Zhang | Chuanxin Zhao | Fulong Chen | Ziyang Zhang | Taochun Wang | Xu Cheng | Hui Sun | Cheng Huang
[1] Ashutosh Saxena,et al. A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.
[2] Prashant Pandey,et al. Cloud computing , 2010, ICWET.
[3] Jan E. Gewehr,et al. Smart Medical Information Technology for Healthcare (SMITH) , 2018, Methods of Information in Medicine.
[4] Feng Yang,et al. Distributed node authentication in wireless sensor networks , 2010, 2010 2nd International Conference on Future Computer and Communication.
[5] Tad Hogg,et al. Refining the Phase Transition in Combinatorial Search , 1996, Artif. Intell..
[6] Imrich Chlamtac,et al. Intermediate-node initiated reservation (IIR): a new signaling scheme for wavelength-routed networks , 2003, IEEE J. Sel. Areas Commun..
[7] Rajaram Ramasamy,et al. New Remote Mutual Authentication Scheme using Smart Cards , 2009, Trans. Data Priv..
[8] Eun-Jun Yoon,et al. A user friendly authentication scheme with anonymity for wireless communications , 2011, Comput. Electr. Eng..
[9] Jing Li,et al. CHIME-Trust: A Trusted Third Party Service for Healthcare , 2000, AMIA.
[10] Fulong Chen,et al. IPv6-Based Architecture of Community Medical Internet of Things , 2018, IEEE Access.
[11] Ramjee Prasad,et al. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..
[12] Sandeep K. Sood,et al. Secure Dynamic Identity-Based Authentication Scheme Using Smart Cards , 2011, Inf. Secur. J. A Glob. Perspect..
[13] Aiqing Zhang,et al. Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems , 2017, IEEE Transactions on Information Forensics and Security.
[14] Fuw-Yi Yang,et al. Password Authentication Scheme Preserving Identity Privacy , 2014, 2014 Sixth International Conference on Measuring Technology and Mechatronics Automation.
[15] Jing-Jang Hwang,et al. Improvement on Peyravian-Zunic's Password Authentication Schemes , 2002 .
[16] Eun-Jun Yoon,et al. A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography , 2016, IEEE Access.
[17] Xiong Li,et al. A novel user authentication scheme with anonymity for wireless communications , 2014, Secur. Commun. Networks.
[18] Yunhao Liu,et al. PLP: Protecting Location Privacy Against Correlation-Analysis Attack in Crowdsensing , 2015, 2015 44th International Conference on Parallel Processing.
[19] Kazuo Yamazaki,et al. Study on LD-VHDL conversion for FPGA-based PLC implementation , 2009 .
[20] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[21] Yu-Fang Chung,et al. A Password-Based User Authentication Scheme for the Integrated EPR Information System , 2012, Journal of Medical Systems.
[22] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.