A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic
暂无分享,去创建一个
[1] Martín Abadi,et al. Authentification and Delegation with Smart-Cards , 1993, Sci. Comput. Program..
[2] Peng Liu,et al. Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks , 2018, IEEE Transactions on Mobile Computing.
[3] Fan Wu,et al. Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care , 2015, Journal of Medical Systems.
[4] Jiankun Hu,et al. New secure healthcare system using cloud of things , 2017, Cluster Computing.
[5] Ja-Ling Wu,et al. A Privacy-Preserving Cloud-Based Data Management System with Efficient Revocation Scheme , 2017, 2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT).
[6] Athanasios V. Vasilakos,et al. An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps , 2013, Journal of Medical Systems.
[7] Pardeep Kumar,et al. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks , 2012, Sensors.
[8] Understanding Security Risks When Exchanging Medical Records Using IHE , 2020 .
[9] Cjf Cas Cremers. Scyther : semantics and verification of security protocols , 2006 .
[10] Jiankun Hu,et al. Corresponding author’s address: , 2022 .
[11] Al-Sakib Khan Pathan. Access to information vs blocking of information during COVID-19 pandemic: a governance dilemma in the era of crowdsourcing based on ICT , 2020 .
[12] Brij B. Gupta,et al. An internet-of-things-based security scheme for healthcare environment for robust location privacy , 2020 .
[13] Rune Fensli,et al. End-to-end Security and Privacy Protection for Co-operative Access to Health and Care Data in a Telehealth Trial System for Remote Supervision of COPD-Patients , 2015 .
[14] Kuan-Ching Li,et al. Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system , 2020, Connect. Sci..
[15] Sherali Zeadally,et al. Analysis of Security Protocols for Mobile Healthcare , 2016, Journal of Medical Systems.
[16] Cheng-Chi Lee,et al. A new three-party-authenticated key agreement scheme based on chaotic maps without password table , 2014, Nonlinear Dynamics.
[17] Yuan Zhang,et al. Design and Data Analysis of Sports Information Acquisition System Based on Internet of Medical Things , 2020, IEEE Access.
[18] S. Vivekanandan,et al. A typical IoT architecture-based regular monitoring of arthritis disease using time wrapping algorithm , 2020 .
[19] Xiong Li,et al. An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks , 2017, Multimedia Systems.
[20] Wei Liang,et al. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.
[21] Abbas Ghaemi Bafghi,et al. An anonymous mobile payment protocol based on SWPP , 2014, Electronic Commerce Research.
[22] Al-Sakib Khan Pathan,et al. Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification , 2019, Complex Adapt. Syst. Model..
[23] Sheetal Kalra,et al. A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services , 2018, Iranian Journal of Science and Technology, Transactions of Electrical Engineering.
[24] Cheng-Chi Lee,et al. Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks , 2013, Multimedia Systems.
[25] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[26] V. N. Sastry,et al. Secure mobile payment framework based on UICC with formal verification , 2014, Int. J. Comput. Sci. Eng..
[27] Sheetal Kalra,et al. Multi-factor user authentication scheme for IoT-based healthcare services , 2018, Journal of Reliable Intelligent Environments.
[28] Cheng-Chi Lee,et al. An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments , 2013, Nonlinear Dynamics.
[29] Bala Srinivasan,et al. Lightweight Mobile Credit-Card Payment Protocol , 2003, INDOCRYPT.
[30] Jie Tang,et al. An edge streaming data processing framework for autonomous driving , 2020 .
[31] Al-Sakib Khan Pathan. Denial of service in wireless sensor networks: issues and challenges , 2010 .
[32] David Naccache,et al. White-Box Cryptography: Security in an Insecure Environment , 2016, IEEE Security & Privacy.