An improved anonymous authentication scheme for telecare medical information systems
F Wen, D Guo - Journal of medical systems, 2014 - Springer
Telecare medical information system (TMIS) constructs an efficient and convenient
connection between patients and the medical server. The patients can enjoy medical …
connection between patients and the medical server. The patients can enjoy medical …
A robust and efficient mutual authentication and key agreement scheme with untraceability for WBANs
Abstract A Wireless Body Area Network is a network of sensors placed on a body, used
primarily in healthcare to monitor the user's physical condition. This technology has …
primarily in healthcare to monitor the user's physical condition. This technology has …
Survey on security in intra-body area network communication
With the advances in microelectronics, embedded computing, and wireless communications,
the interest in Body Sensor Networks has risen sharply and has enabled the development …
the interest in Body Sensor Networks has risen sharply and has enabled the development …
An enhanced privacy preserving remote user authentication scheme with provable security
Very recently, Kumari et al. proposed a symmetric key and smart card‐based remote user
password authentication scheme to enhance Chung et al.'s scheme. They claimed their …
password authentication scheme to enhance Chung et al.'s scheme. They claimed their …
A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security
Ubiquitous networks provide roaming service for mobile nodes enabling them to use the
services extended by their home networks in a foreign network. A mutual authentication …
services extended by their home networks in a foreign network. A mutual authentication …
An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography
Telecare medicine information system (TMIS) offers the patients convenient and expedite
healthcare services remotely anywhere. Patient security and privacy has emerged as key …
healthcare services remotely anywhere. Patient security and privacy has emerged as key …
Hybrid cryptography algorithm for securing wireless sensor networks from Node Clone Attack
Background: Security in WSNs is the most significant because sensor nodes deployed are in
an unattended environment, and the information is communicated over insecure wireless …
an unattended environment, and the information is communicated over insecure wireless …
A secure biometric based multi-server authentication scheme for social multimedia networks
SA Chaudhry - Multimedia Tools and Applications, 2016 - Springer
Social networking is one of the major source of massive data. Such data is not only difficult
to store, manipulate and maintain but it's open access makes it security prone. Therefore …
to store, manipulate and maintain but it's open access makes it security prone. Therefore …
[PDF][PDF] An efficient and secure session key establishment scheme for health-care applications in wireless body area networks
ABSTRACT Wireless Body Area Network (WBAN) is special breed of Wireless Sensor
Network (WSN). Due to the increasing interest and the tremendous advancement in …
Network (WSN). Due to the increasing interest and the tremendous advancement in …
A new remote user authentication scheme for e-health-care applications using steganography
MM Alhejazi, EM Al-Dahasi… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
The internet is getting more popular these days and the applications that help human lives
are spreading across the world, one useful area to mention is healthcare, healthcare …
are spreading across the world, one useful area to mention is healthcare, healthcare …