1 |
Wei, J.,Hu, X.,Liu, W., An Improved Authentication Scheme for Telecare Medicine Information Systems., J. Med. Syst. doi: 10.1007/s10916-012-9835-1, 2012.
DOI
ScienceOn
|
2 |
B. Alomair, L. Lazos, and R. Poovendran, Securing Low-Cost RFID Systems: An Unconditionally Secure Approach. J. Computer Security, Vol. 19, No. 2, pp. 229-256, 2011.
DOI
|
3 |
B. Alomair and R. Poovendran, Privacy Versus Scalability in Radio Frequency Identification Systems. Computer Comm., Vol. 33, No. 18, pp. 2155-2163, 2010.
DOI
ScienceOn
|
4 |
G. Lowe. Casper: A compiler for the analysis of security protocols. User Manual and Tutorial. Version 1.12 2009.
|
5 |
Oxford University Computing Laboratory. FDR2 User Manual, 19th October 2010.
|
6 |
C.A.R Hoare. Communicating Sequential Processes. Prentice-Hall. 1985.
|
7 |
B. H. Kim, I. T. Ryoo, RFID Mutual Authentication Protocol Against Reflection Attack, THE JOURNAL OF KOREA INFORMATION AND COMMUNICATIONS SOCIETY, Vol. 32, No 3, pp. 348-354, 2007.
과학기술학회마을
|
8 |
H. S. Ahn, K. D. B, E. J. Yoon, I. G. Nam, RFID Mutual Authentication Protocol Providing Stronger Security. The KIPS Transactions : Part C Vol. 16.C, No. 3, pp. 325-334, 2009.
과학기술학회마을
DOI
ScienceOn
|
9 |
M. H. Yang, H. Y. Hu, Protocol for ownership transfer across authorities: with the ability to assign transfer targety. Security Comm. Networks Vol. 5, 164-177, 2012.
DOI
|
10 |
D. W. Kim, J. W. Han, and K. I. Chung, Trend of Home Device Authentication/ Authorization Technology. Weekly IT BRIEF, No. 1329, pp. 1-11, 2008.
|
11 |
Yu-Yi Chen, Jun-Chao Lu, Jinn-Ke Jan, A Secure EHR System Based on Hybrid Clouds. J Med Syst, Vol. 6, pp. 3375-3384, 2012.
|
12 |
M. M. Morshed, A. A. H. Yu, An Efficient and Secure Authentication Protocol for RFID Systems. Proceedings of the 17th International Conference on Automation & Computing (ICAC'11), University of Huddersfield, Huddersfield, UK, 10 September, pp. 51-56, 2011.
|
13 |
He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. doi: 10.1007/s10916-011-9658-5, 2011.
DOI
ScienceOn
|
14 |
J.E. Song et al., Security Issues and Its Technology Trends in u-Healthcare. ETRI, Electronics and Telecommunications Trends, Vol.22, No.1, 2007.
과학기술학회마을
|