ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve Cryptosystem
2016 11th International Conference on Availability, Reliability and Security (ARES)
◽
10.1109/ares.2016.43
◽
2016
◽
Cited By ~ 1
Author(s):
Toan Thinh Truong
◽
Duong Tien Phan
◽
Minh Triet Tran
◽
Anh Duc Duong
◽
Isao Echizen
Keyword(s):
Information System
◽
Elliptic Curve
◽
User Authentication
◽
Authentication Scheme
◽
Telecare Medicine Information System
◽
Elliptic Curve Cryptosystem
◽
Medicine Information
◽
User Authentication Scheme
Download Full-text
Related Documents
Cited By
References
Renewable and Anonymous Biometrics-Based Remote User Authentication Scheme Using Smart Cards for Telecare Medicine Information System
2019 Advances in Science and Engineering Technology International Conferences (ASET)
◽
10.1109/icaset.2019.8714479
◽
2019
◽
Cited By ~ 2
Author(s):
Alawi A. Al-Saggaf
◽
Tarek R Sheltami
Keyword(s):
Information System
◽
User Authentication
◽
Smart Cards
◽
Authentication Scheme
◽
Telecare Medicine Information System
◽
Medicine Information
◽
Remote User Authentication
◽
User Authentication Scheme
◽
Remote User
Download Full-text
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks
Sensors
◽
10.3390/s17122946
◽
2017
◽
Vol 17
(12)
◽
pp. 2946
◽
Cited By ~ 21
Author(s):
Chenyu Wang
◽
Guoai Xu
◽
Jing Sun
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Elliptic Curve
◽
User Authentication
◽
Authentication Scheme
◽
Wireless Sensor
◽
Elliptic Curve Cryptosystem
◽
User Authentication Scheme
◽
Three Factor
Download Full-text
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity
Security and Communication Networks
◽
10.1002/sec.977
◽
2014
◽
Vol 8
(2)
◽
pp. 245-260
◽
Cited By ~ 31
Author(s):
Lili Xu
◽
Fan Wu
Keyword(s):
Elliptic Curve
◽
User Authentication
◽
User Anonymity
◽
Authentication Scheme
◽
Elliptic Curve Cryptosystem
◽
Remote User Authentication
◽
User Authentication Scheme
◽
Remote User
Download Full-text
A Secure Three-Factor Remote User Authentication Scheme Using Elliptic Curve Cryptosystem
Proceedings of the International Conference on Microelectronics, Computing & Communication Systems - Lecture Notes in Electrical Engineering
◽
10.1007/978-981-10-5565-2_2
◽
2017
◽
pp. 9-24
◽
Cited By ~ 1
Author(s):
Rifaqat Ali
◽
Arup Kumar Pal
Keyword(s):
Elliptic Curve
◽
User Authentication
◽
Authentication Scheme
◽
Elliptic Curve Cryptosystem
◽
Remote User Authentication
◽
User Authentication Scheme
◽
Remote User
◽
Three Factor
Download Full-text
A Password-Based User Authentication Scheme for the Integrated EPR Information System
Journal of Medical Systems
◽
10.1007/s10916-010-9527-7
◽
2010
◽
Vol 36
(2)
◽
pp. 631-638
◽
Cited By ~ 29
Author(s):
Zhen-Yu Wu
◽
Yufang Chung
◽
Feipei Lai
◽
Tzer-Shyong Chen
Keyword(s):
Information System
◽
User Authentication
◽
Authentication Scheme
◽
User Authentication Scheme
◽
Integrated Epr Information System
Download Full-text
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography
The Journal of Supercomputing
◽
10.1007/s11227-020-03318-7
◽
2020
◽
Cited By ~ 3
Author(s):
Dipanwita Sadhukhan
◽
Sangram Ray
◽
G. P. Biswas
◽
M. K. Khan
◽
Mou Dasgupta
Keyword(s):
Elliptic Curve
◽
Elliptic Curve Cryptography
◽
User Authentication
◽
Authentication Scheme
◽
Remote User Authentication
◽
User Authentication Scheme
◽
Remote User
Download Full-text
An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography
Journal of Medical Systems
◽
10.1007/s10916-015-0351-y
◽
2015
◽
Vol 39
(11)
◽
Cited By ~ 42
Author(s):
Ruhul Amin
◽
SK Hafizul Islam
◽
G. P. Biswas
◽
Muhammad Khurram Khan
◽
Neeraj Kumar
Keyword(s):
Elliptic Curve
◽
Smart Card
◽
Elliptic Curve Cryptography
◽
User Authentication
◽
Authentication Scheme
◽
User Authentication Scheme
Download Full-text
A More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System
Journal of Medical Systems
◽
10.1007/s10916-014-0042-0
◽
2014
◽
Vol 38
(5)
◽
Cited By ~ 14
Author(s):
Fengtong Wen
Keyword(s):
Information System
◽
User Authentication
◽
Authentication Scheme
◽
User Authentication Scheme
◽
Integrated Epr Information System
Download Full-text
Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’
PLoS ONE
◽
10.1371/journal.pone.0131368
◽
2015
◽
Vol 10
(8)
◽
pp. e0131368
◽
Cited By ~ 11
Author(s):
SK Hafizul Islam
◽
Muhammad Khurram Khan
◽
Xiong Li
Keyword(s):
Information System
◽
User Authentication
◽
Security Analysis
◽
Authentication Scheme
◽
User Authentication Scheme
◽
Integrated Epr Information System
Download Full-text
A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards for the Integrated EPR Information System
Journal of Medical Systems
◽
10.1007/s10916-015-0204-8
◽
2015
◽
Vol 39
(3)
◽
Cited By ~ 12
Author(s):
Ashok Kumar Das
Keyword(s):
Information System
◽
User Authentication
◽
Smart Cards
◽
Authentication Scheme
◽
Remote User Authentication
◽
User Authentication Scheme
◽
Integrated Epr Information System
◽
Remote User
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close