标题
Analysis of Security Protocols for Mobile Healthcare
作者
关键词
Attack, Communication cost, Computation cost, Mobile healthcare, Mobile device, Protocol, Security, Threat
出版物
JOURNAL OF MEDICAL SYSTEMS
Volume 40, Issue 11, Pages -
出版商
Springer Nature
发表日期
2016-09-17
DOI
10.1007/s10916-016-0596-0
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- Provably Secure Anonymous Single-Sign-On Authentication Mechanisms Using Extended Chebyshev Chaotic Maps for Distributed Computer Networks
- (2018) Tian-Fu Lee IEEE Systems Journal
- Privacy Protection for Telecare Medicine Information Systems Using a Chaotic Map-Based Three-Factor Authenticated Key Agreement Scheme
- (2017) Liping Zhang et al. IEEE Journal of Biomedical and Health Informatics
- Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems
- (2016) Anil Kumar Sutrala et al. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE
- An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps
- (2016) Jongho Moon et al. JOURNAL OF MEDICAL SYSTEMS
- A privacy preserving three-factor authentication protocol for e-Health clouds
- (2016) Qi Jiang et al. JOURNAL OF SUPERCOMPUTING
- Authentication protocol for an ambient assisted living system
- (2015) Debiao He et al. IEEE COMMUNICATIONS MAGAZINE
- A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
- (2015) Vanga Odelu et al. IEEE Transactions on Information Forensics and Security
- An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
- (2015) Debiao He et al. IEEE Transactions on Information Forensics and Security
- User Verification Leveraging Gait Recognition for Smartphone Enabled Mobile Healthcare Systems
- (2015) Yanzhi Ren et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems
- (2015) Hamed Arshad et al. JOURNAL OF MEDICAL SYSTEMS
- A Secure Biometrics Based Authentication with Key Agreement Scheme in Telemedicine Networks for E-Health Services
- (2015) Omid Mir et al. WIRELESS PERSONAL COMMUNICATIONS
- A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System
- (2015) Deebak Bakkiam David et al. WIRELESS PERSONAL COMMUNICATIONS
- Mobile healthcare applications: system design review, critical issues and challenges
- (2014) Mirza Mansoor Baig et al. AUSTRALASIAN PHYSICAL & ENGINEERING SCIENCES IN MEDICINE
- Integration of Cloud computing and body sensor networks
- (2014) Giancarlo Fortino et al. Future Generation Computer Systems-The International Journal of eScience
- Enhanced three-factor security protocol for consumer USB mass storage devices
- (2014) Debiao He et al. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
- Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce
- (2014) Dheerendra Mishra et al. JOURNAL OF MEDICAL SYSTEMS
- An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture
- (2014) Xiong Li et al. WIRELESS PERSONAL COMMUNICATIONS
- Cryptanalysis of a dynamic identity-based remote user authentication scheme with verifiable password update
- (2013) Xiong Li et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System
- (2013) Vanga Odelu et al. JOURNAL OF MEDICAL SYSTEMS
- The adoption of mobile healthcare by hospital's professionals: An integrative perspective
- (2011) Ing-Long Wu et al. DECISION SUPPORT SYSTEMS
- Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
- (2011) A.K. Das IET Information Security
- Monitoring patients via a secure and mobile healthcare system
- (2010) Yonglin Ren et al. IEEE WIRELESS COMMUNICATIONS
- A secure mobile healthcare system using trust-based multicast scheme
- (2009) IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Two-factor user authentication in wireless sensor networks
- (2009) Manik Lal Das IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- An efficient biometrics-based remote user authentication scheme using smart cards
- (2009) Chun-Ta Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- (2006) Linhua Zhang CHAOS SOLITONS & FRACTALS
Become a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get StartedAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started