- Home
- Publications
- Publication Search
- Publication Details
Title
Analysis of Security Protocols for Mobile Healthcare
Authors
Keywords
Attack, Communication cost, Computation cost, Mobile healthcare, Mobile device, Protocol, Security, Threat
Journal
JOURNAL OF MEDICAL SYSTEMS
Volume 40, Issue 11, Pages -
Publisher
Springer Nature
Online
2016-09-17
DOI
10.1007/s10916-016-0596-0
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Provably Secure Anonymous Single-Sign-On Authentication Mechanisms Using Extended Chebyshev Chaotic Maps for Distributed Computer Networks
- (2018) Tian-Fu Lee IEEE Systems Journal
- Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme
- (2017) Liping Zhang et al. IEEE Journal of Biomedical and Health Informatics
- Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems
- (2016) Anil Kumar Sutrala et al. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE
- An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps
- (2016) Jongho Moon et al. JOURNAL OF MEDICAL SYSTEMS
- A privacy preserving three-factor authentication protocol for e-Health clouds
- (2016) Qi Jiang et al. JOURNAL OF SUPERCOMPUTING
- Authentication protocol for an ambient assisted living system
- (2015) Debiao He et al. IEEE COMMUNICATIONS MAGAZINE
- A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
- (2015) Vanga Odelu et al. IEEE Transactions on Information Forensics and Security
- An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
- (2015) Debiao He et al. IEEE Transactions on Information Forensics and Security
- User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems
- (2015) Yanzhi Ren et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
- (2015) Hamed Arshad et al. JOURNAL OF MEDICAL SYSTEMS
- A Secure Biometrics Based Authentication with Key Agreement Scheme in Telemedicine Networks for E-Health Services
- (2015) Omid Mir et al. WIRELESS PERSONAL COMMUNICATIONS
- A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System
- (2015) Deebak Bakkiam David et al. WIRELESS PERSONAL COMMUNICATIONS
- Mobile healthcare applications: system design review, critical issues and challenges
- (2014) Mirza Mansoor Baig et al. AUSTRALASIAN PHYSICAL & ENGINEERING SCIENCES IN MEDICINE
- Integration of Cloud computing and body sensor networks
- (2014) Giancarlo Fortino et al. Future Generation Computer Systems-The International Journal of eScience
- Enhanced three-factor security protocol for consumer USB mass storage devices
- (2014) Debiao He et al. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
- Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce
- (2014) Dheerendra Mishra et al. JOURNAL OF MEDICAL SYSTEMS
- An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture
- (2014) Xiong Li et al. WIRELESS PERSONAL COMMUNICATIONS
- Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update
- (2013) Xiong Li et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System
- (2013) Vanga Odelu et al. JOURNAL OF MEDICAL SYSTEMS
- The adoption of mobile healthcare by hospital's professionals: An integrative perspective
- (2011) Ing-Long Wu et al. DECISION SUPPORT SYSTEMS
- Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
- (2011) A.K. Das IET Information Security
- Monitoring patients via a secure and mobile healthcare system
- (2010) Yonglin Ren et al. IEEE WIRELESS COMMUNICATIONS
- A secure mobile healthcare system using trust-based multicast scheme
- (2009) IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Two-factor user authentication in wireless sensor networks
- (2009) Manik Lal Das IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- An efficient biometrics-based remote user authentication scheme using smart cards
- (2009) Chun-Ta Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- (2006) Linhua Zhang CHAOS SOLITONS & FRACTALS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now