• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4615863)   Today's Articles (133)   Subscriber (49393)
For: Chaudhry SA, Mahmood K, Naqvi H, Khan MK. An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography. J Med Syst 2015;39:175. [PMID: 26399937 DOI: 10.1007/s10916-015-0335-y] [Citation(s) in RCA: 36] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/27/2015] [Accepted: 08/26/2015] [Indexed: 10/23/2022]
Number Cited by Other Article(s)
1
Chen Y, Chen J. A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography. MULTIMEDIA TOOLS AND APPLICATIONS 2022;82:16009-16032. [PMID: 36250183 PMCID: PMC9553637 DOI: 10.1007/s11042-022-14007-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 03/14/2021] [Revised: 05/25/2021] [Accepted: 01/31/2022] [Indexed: 06/16/2023]
2
Dey J, Sarkar A, Karforma S, Chowdhury B. Metaheuristic secured transmission in Telecare Medical Information System (TMIS) in the face of post-COVID-19. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2021;14:6623-6644. [PMID: 34721709 PMCID: PMC8536920 DOI: 10.1007/s12652-021-03531-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/18/2021] [Accepted: 09/23/2021] [Indexed: 05/25/2023]
3
Electrocardiogram signals-based user authentication systems using soft computing techniques. Artif Intell Rev 2020. [DOI: 10.1007/s10462-020-09863-0] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
4
Ali Z, Ghani A, Khan I, Chaudhry SA, Islam SKH, Giri D. A robust authentication and access control protocol for securing wireless healthcare sensor networks. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020. [DOI: 10.1016/j.jisa.2020.102502] [Citation(s) in RCA: 21] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
5
Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M. A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications. J Med Syst 2018;43:10. [PMID: 30506115 DOI: 10.1007/s10916-018-1120-5] [Citation(s) in RCA: 37] [Impact Index Per Article: 6.2] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/28/2018] [Accepted: 11/06/2018] [Indexed: 11/26/2022]
6
Alzahrani BA, Irshad A. A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2018. [DOI: 10.1007/s13369-018-3494-6] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
7
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing. JOURNAL OF HEALTHCARE ENGINEERING 2018;2018:6410180. [PMID: 29796233 PMCID: PMC5896203 DOI: 10.1155/2018/6410180] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/22/2017] [Accepted: 12/25/2017] [Indexed: 11/18/2022]
8
Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals. ENTROPY 2018;20:e20020094. [PMID: 33265185 PMCID: PMC7512659 DOI: 10.3390/e20020094] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/21/2017] [Revised: 01/24/2018] [Accepted: 01/26/2018] [Indexed: 12/02/2022]
9
Murillo-Escobar MA, Cardoza-Avendaño L, López-Gutiérrez RM, Cruz-Hernández C. A Double Chaotic Layer Encryption Algorithm for Clinical Signals in Telemedicine. J Med Syst 2017;41:59. [PMID: 28247306 DOI: 10.1007/s10916-017-0698-3] [Citation(s) in RCA: 42] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/13/2016] [Accepted: 02/05/2017] [Indexed: 11/30/2022]
10
Jung J, Kang D, Lee D, Won D. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System. PLoS One 2017;12:e0169414. [PMID: 28046075 PMCID: PMC5207724 DOI: 10.1371/journal.pone.0169414] [Citation(s) in RCA: 26] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/11/2016] [Accepted: 12/17/2016] [Indexed: 12/04/2022]  Open
11
A Survey of Authentication Schemes in Telecare Medicine Information Systems. J Med Syst 2016;41:14. [PMID: 27900653 DOI: 10.1007/s10916-016-0658-3] [Citation(s) in RCA: 16] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/06/2016] [Accepted: 11/08/2016] [Indexed: 10/20/2022]
12
Xie Q, Tang Z. Biometrics based authentication scheme for session initiation protocol. SPRINGERPLUS 2016;5:1045. [PMID: 27462493 PMCID: PMC4940359 DOI: 10.1186/s40064-016-2725-0] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/26/2016] [Accepted: 06/30/2016] [Indexed: 11/10/2022]
13
Chaotic Visual Cryptosystem Using Empirical Mode Decomposition Algorithm for Clinical EEG Signals. J Med Syst 2015;40:52. [PMID: 26645316 DOI: 10.1007/s10916-015-0414-0] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/16/2015] [Accepted: 11/17/2015] [Indexed: 10/22/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA