• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4615863)   Today's Articles (18)   Subscriber (49393)
For: Arshad H, Nikooghadam M. Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems. J Med Syst 2014;38:136. [DOI: 10.1007/s10916-014-0136-8] [Citation(s) in RCA: 93] [Impact Index Per Article: 9.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/31/2014] [Accepted: 09/22/2014] [Indexed: 11/25/2022]
Number Cited by Other Article(s)
1
Yupapin P, Meshram C, Barve SK, Ibrahim RW, Akbar MA. An efficient provably secure verifier-based authentication protocol using fractional chaotic maps in telecare medicine information systems. Soft comput 2023. [DOI: 10.1007/s00500-023-07889-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/15/2023]
2
Ghahramani M, Javidan R. Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES 2022. [DOI: 10.1007/s11416-022-00448-9] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/14/2022]
3
Shamshad S, Minahil, Mahmood K, Kumari S, Chen CM. A secure blockchain-based e-health records storage and sharing scheme. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020. [DOI: 10.1016/j.jisa.2020.102590] [Citation(s) in RCA: 28] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
4
Ali Z, Ghani A, Khan I, Chaudhry SA, Islam SKH, Giri D. A robust authentication and access control protocol for securing wireless healthcare sensor networks. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020. [DOI: 10.1016/j.jisa.2020.102502] [Citation(s) in RCA: 21] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
5
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem. Soft comput 2020. [DOI: 10.1007/s00500-020-04768-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
6
Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M. A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications. J Med Syst 2018;43:10. [PMID: 30506115 DOI: 10.1007/s10916-018-1120-5] [Citation(s) in RCA: 37] [Impact Index Per Article: 6.2] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/28/2018] [Accepted: 11/06/2018] [Indexed: 11/26/2022]
7
A biometric security scheme for wireless body area networks. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2018. [DOI: 10.1016/j.jisa.2018.06.001] [Citation(s) in RCA: 15] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
8
Roy S, Chatterjee S, Mahapatra G. An efficient biometric based remote user authentication scheme for secure internet of things environment. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2018. [DOI: 10.3233/jifs-169435] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
9
Chandrakar P, Om H. Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment. INTERNATIONAL JOURNAL OF BUSINESS DATA COMMUNICATIONS AND NETWORKING 2017. [DOI: 10.4018/ijbdcn.2017010108] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
10
A Survey of Authentication Schemes in Telecare Medicine Information Systems. J Med Syst 2016;41:14. [PMID: 27900653 DOI: 10.1007/s10916-016-0658-3] [Citation(s) in RCA: 16] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/06/2016] [Accepted: 11/08/2016] [Indexed: 10/20/2022]
11
Zhang L, Zhu S, Tang S. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme. IEEE J Biomed Health Inform 2016;21:465-475. [PMID: 26766384 DOI: 10.1109/jbhi.2016.2517146] [Citation(s) in RCA: 53] [Impact Index Per Article: 6.6] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
12
Moon J, Choi Y, Kim J, Won D. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps. J Med Syst 2016;40:70. [PMID: 26743628 DOI: 10.1007/s10916-015-0422-0] [Citation(s) in RCA: 27] [Impact Index Per Article: 3.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/28/2015] [Accepted: 12/08/2015] [Indexed: 10/22/2022]
13
An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography. J Med Syst 2015;39:175. [PMID: 26399937 DOI: 10.1007/s10916-015-0335-y] [Citation(s) in RCA: 36] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/27/2015] [Accepted: 08/26/2015] [Indexed: 10/23/2022]
14
Amin R, Islam SKH, Biswas GP, Khan MK, Li X. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems. J Med Syst 2015;39:140. [PMID: 26342492 DOI: 10.1007/s10916-015-0318-z] [Citation(s) in RCA: 51] [Impact Index Per Article: 5.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/20/2015] [Accepted: 08/07/2015] [Indexed: 11/28/2022]
15
Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System. J Med Syst 2015;39:137. [PMID: 26324169 DOI: 10.1007/s10916-015-0307-2] [Citation(s) in RCA: 24] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/14/2015] [Accepted: 07/29/2015] [Indexed: 10/23/2022]
16
A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems. J Med Syst 2015;39:89. [PMID: 26242748 DOI: 10.1007/s10916-015-0265-8] [Citation(s) in RCA: 30] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/11/2015] [Accepted: 06/16/2015] [Indexed: 10/23/2022]
17
An Improved RSA Based User Authentication and Session Key Agreement Protocol Usable in TMIS. J Med Syst 2015;39:79. [PMID: 26123833 DOI: 10.1007/s10916-015-0262-y] [Citation(s) in RCA: 32] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/15/2015] [Accepted: 06/02/2015] [Indexed: 10/23/2022]
18
A Secure Three-Factor User Authentication and Key Agreement Protocol for TMIS With User Anonymity. J Med Syst 2015;39:78. [DOI: 10.1007/s10916-015-0258-7] [Citation(s) in RCA: 56] [Impact Index Per Article: 6.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/25/2015] [Accepted: 06/02/2015] [Indexed: 11/30/2022]
19
Arshad H, Teymoori V, Nikooghadam M, Abbassi H. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems. J Med Syst 2015;39:76. [DOI: 10.1007/s10916-015-0259-6] [Citation(s) in RCA: 22] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/31/2015] [Accepted: 06/02/2015] [Indexed: 10/23/2022]
20
Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems. J Med Syst 2015;39:49. [PMID: 25732081 DOI: 10.1007/s10916-015-0233-3] [Citation(s) in RCA: 15] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/07/2015] [Accepted: 02/11/2015] [Indexed: 10/23/2022]
21
Lu Y, Li L, Peng H, Yang Y. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem. J Med Syst 2015;39:32. [PMID: 25681101 PMCID: PMC4328119 DOI: 10.1007/s10916-015-0221-7] [Citation(s) in RCA: 77] [Impact Index Per Article: 8.6] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/24/2014] [Accepted: 01/26/2015] [Indexed: 11/26/2022]
22
Das AK. A secure user anonymity-preserving three-factor remote user authentication scheme for the telecare medicine information systems. J Med Syst 2015;39:30. [PMID: 25677956 DOI: 10.1007/s10916-015-0218-2] [Citation(s) in RCA: 33] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/04/2014] [Accepted: 01/26/2015] [Indexed: 11/25/2022]
23
Guo D, Wen Q, Li W, Zhang H, Jin Z. An improved biometrics-based authentication scheme for telecare medical information systems. J Med Syst 2015;39:20. [PMID: 25663481 DOI: 10.1007/s10916-015-0194-6] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/11/2014] [Accepted: 01/07/2015] [Indexed: 10/24/2022]
24
The Current and Future Needs of Our Medical Systems. J Med Syst 2015;39:16. [DOI: 10.1007/s10916-015-0212-8] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/13/2015] [Accepted: 01/20/2015] [Indexed: 10/24/2022]
25
Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care. J Med Syst 2015;39:10. [PMID: 25631840 DOI: 10.1007/s10916-014-0179-x] [Citation(s) in RCA: 57] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/21/2014] [Accepted: 11/28/2014] [Indexed: 10/24/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA