Author:
R Madhusudhan,Nayak Chaitanya S.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference68 articles.
1. Amin R, Biswas G (2015) An improved rsa based user authentication and session key agreement protocol usable in tmis. J Med Sys 39(8):79
2. Arshad H, Nikooghadam M (2014) Three-factor anonymous authentication and key agreement scheme for telecare medicine information systems. J Med Sys 38(12):136
3. Barrows RC Jr, Clayton PD (1996) Privacy, confidentiality, and electronic medical records. Journal of the American Medical Informatics Association 3(2):139–148
4. Bhattacharyya D, Ranjan R, Alisherov F, Choi M, et al. (2009) Biometric authentication: a review. Int J u-and e-Service Sci Technol 2(3):13–28
5. Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proceedings of the Royal Society of London, A. Mathematical and Physical Sciences 426 (1871):233–271
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献