• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4615863)   Today's Articles (133)   Subscriber (49393)
For: Zhang L, Zhu S, Tang S. Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme. IEEE J Biomed Health Inform 2016;21:465-475. [PMID: 26766384 DOI: 10.1109/jbhi.2016.2517146] [Citation(s) in RCA: 53] [Impact Index Per Article: 6.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
Number Cited by Other Article(s)
1
Liu K, Xu G, Cao Q, Wang C, Jia J, Gao Y, Xu G. A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks. SENSORS (BASEL, SWITZERLAND) 2023;23:8992. [PMID: 37960691 PMCID: PMC10648803 DOI: 10.3390/s23218992] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/18/2023] [Revised: 10/23/2023] [Accepted: 10/30/2023] [Indexed: 11/15/2023]
2
Chatterjee K, Singh A, Neha, Yu K. A Multifactor Ring Signature based Authentication Scheme for Quality Assessment of IoMT Environment in COVID-19 Scenario. ACM JOURNAL OF DATA AND INFORMATION QUALITY 2023. [DOI: 10.1145/3575811] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/21/2023]
3
Radial Neural Network Processing Applied to Athlete’s Personalized Psychological Regulation Detection System. BIOMED RESEARCH INTERNATIONAL 2022;2022:2446947. [PMID: 36105934 PMCID: PMC9467733 DOI: 10.1155/2022/2446947] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/14/2022] [Revised: 08/10/2022] [Accepted: 08/20/2022] [Indexed: 11/17/2022]
4
Extended Chaotic-Map-Based User Authentication and Key Agreement for HIPAA Privacy/Security Regulations. APPLIED SCIENCES-BASEL 2022. [DOI: 10.3390/app12115701] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/01/2023]
5
Cybersecurity Enterprises Policies: A Comparative Study. SENSORS 2022;22:s22020538. [PMID: 35062504 PMCID: PMC8778887 DOI: 10.3390/s22020538] [Citation(s) in RCA: 5] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/15/2021] [Revised: 12/26/2021] [Accepted: 01/06/2022] [Indexed: 02/04/2023]
6
Blockchain-Based Healthcare Information Preservation Using Extended Chaotic Maps for HIPAA Privacy/Security Regulations. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app112210576] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
7
Construction of a Chaotic Map-Based Authentication Protocol for TMIS. J Med Syst 2021;45:77. [PMID: 34213620 DOI: 10.1007/s10916-021-01750-7] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/01/2020] [Accepted: 06/10/2021] [Indexed: 10/21/2022]
8
A construction of a conformal Chebyshev chaotic map based authentication protocol for healthcare telemedicine services. COMPLEX INTELL SYST 2021;7:2531-2542. [PMID: 34777969 PMCID: PMC8214463 DOI: 10.1007/s40747-021-00441-7] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/11/2021] [Accepted: 06/10/2021] [Indexed: 11/24/2022]
9
Secure and Efficient Cloud-based IoT Authenticated Key Agreement scheme for e-Health Wireless Sensor Networks. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2020. [DOI: 10.1007/s13369-020-04905-9] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
10
Revisit of Password-Authenticated Key Exchange Protocol for Healthcare Support Wireless Communication. ELECTRONICS 2020. [DOI: 10.3390/electronics9050733] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
11
Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks. SENSORS 2020;20:s20092511. [PMID: 32365543 PMCID: PMC7273228 DOI: 10.3390/s20092511] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/21/2020] [Revised: 04/20/2020] [Accepted: 04/25/2020] [Indexed: 11/21/2022]
12
Dharminder D, Mishra D, Li X. Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services : Authorized Access to Healthcare Services. J Med Syst 2019;44:6. [PMID: 31776688 DOI: 10.1007/s10916-019-1471-6] [Citation(s) in RCA: 13] [Impact Index Per Article: 2.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/19/2019] [Accepted: 10/11/2019] [Indexed: 10/25/2022]
13
Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M. A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications. J Med Syst 2018;43:10. [PMID: 30506115 DOI: 10.1007/s10916-018-1120-5] [Citation(s) in RCA: 37] [Impact Index Per Article: 6.2] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/28/2018] [Accepted: 11/06/2018] [Indexed: 11/26/2022]
14
Xu D, Chen J, Zhang S, Liu Q. Privacy-Preserving and Efficient Truly Three-Factor Authentication Scheme for Telecare Medical Information Systems. J Med Syst 2018;42:219. [PMID: 30280263 DOI: 10.1007/s10916-018-1047-x] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/01/2017] [Accepted: 08/27/2018] [Indexed: 11/26/2022]
15
Alzahrani BA, Irshad A. A Secure and Efficient TMIS-Based Authentication Scheme Improved Against Zhang et al.’s Scheme. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2018. [DOI: 10.1007/s13369-018-3494-6] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
16
Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2018. [DOI: 10.1007/s13369-018-3220-4] [Citation(s) in RCA: 13] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/17/2022]
17
Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT. APPLIED SCIENCES-BASEL 2017. [DOI: 10.3390/app7101069] [Citation(s) in RCA: 22] [Impact Index Per Article: 3.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
18
Avila K, Sanmartin P, Jabba D, Jimeno M. Applications Based on Service-Oriented Architecture (SOA) in the Field of Home Healthcare. SENSORS 2017;17:s17081703. [PMID: 28757557 PMCID: PMC5579483 DOI: 10.3390/s17081703] [Citation(s) in RCA: 28] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/22/2017] [Revised: 07/17/2017] [Accepted: 07/18/2017] [Indexed: 11/25/2022]
19
ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment. J Med Syst 2017;41:44. [PMID: 28181095 DOI: 10.1007/s10916-017-0693-8] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/14/2016] [Accepted: 01/29/2017] [Indexed: 10/20/2022]
20
Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems. J Med Syst 2016;40:237. [DOI: 10.1007/s10916-016-0585-3] [Citation(s) in RCA: 14] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/04/2016] [Accepted: 09/04/2016] [Indexed: 10/21/2022]
21
Wazid M, Zeadally S, Das AK, Odelu V. Analysis of Security Protocols for Mobile Healthcare. J Med Syst 2016;40:229. [DOI: 10.1007/s10916-016-0596-0] [Citation(s) in RCA: 25] [Impact Index Per Article: 3.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/30/2016] [Accepted: 09/05/2016] [Indexed: 11/30/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA