A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems
暂无分享,去创建一个
Qinghai Yang | Jiantao Wang | Xinhong Hao | Ping Li | Xiaopeng Yan | Ping Li | Xiao-peng Yan | Qinghai Yang | Xinhong Hao | Jiantao Wang
[1] Zhian Zhu,et al. An Efficient Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[2] Alfredo De Santis,et al. Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.
[3] Ingrid Moerman,et al. A survey on wireless body area networks , 2011, Wirel. Networks.
[4] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[5] Yu-Fang Chung,et al. A Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[6] Chin-Chen Chang,et al. Chaotic maps-based password-authenticated key agreement using smart cards , 2013, Commun. Nonlinear Sci. Numer. Simul..
[7] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[8] Rui Zhang,et al. A More Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[9] Wuu Yang,et al. A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.
[10] Wenfen Liu,et al. An Improved Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[11] Zhang Rui,et al. A More Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of medical systems.
[12] Xingyuan Wang,et al. An anonymous key agreement protocol based on chaotic maps , 2011 .
[13] Emil Jovanov,et al. Guest Editorial Introduction to the Special Section on M-Health: Beyond Seamless Mobility and Global Wireless Health-Care Connectivity , 2004, IEEE Transactions on Information Technology in Biomedicine.
[14] Peilin Hong,et al. Security improvement on an anonymous key agreement protocol based on chaotic maps , 2012 .
[15] Jianhua Li,et al. Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards , 2010, IEEE Transactions on Industrial Electronics.
[16] Xing-yuan Wang,et al. An improved key agreement protocol based on chaos , 2010 .
[17] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.