Publisher
Springer Science and Business Media LLC
Subject
Health Information Management,Health Informatics,Information Systems,Medicine (miscellaneous)
Reference46 articles.
1. Boyd, C., and Mathuria, A., Protocols for authentication and key establishment. Berlin Heidelberg: Springer, 2003.
2. Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Cryptographic Hardware and Embedded Systems-CHES 2004. LNCS, Vol. 3156, pp. 16–29. Springer 2004
3. Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):1–7, 2013.
4. Chen, H. M., Lo, J. W., Yeh, C. K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915 , 2012.
5. Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On the indistinguishability-based security model of key agreement protocols-simple cases. IACR Cryptology ePrint Archive, https://eprint.iacr.org/2005/129.pdf (2005)
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献