has been cited by the following article(s):
[1]
|
Cryptanalysis on “a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ”
Cyber Security and Applications,
2023
DOI:10.1016/j.csa.2022.100008
|
|
|
[2]
|
Cryptanalysis on “a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ”
Cyber Security and Applications,
2023
DOI:10.1016/j.csa.2022.100008
|
|
|
[3]
|
An efficient and authenticated key establishment scheme based on fog computing for healthcare system
Frontiers of Computer Science,
2022
DOI:10.1007/s11704-021-0537-z
|
|
|
[4]
|
An efficient and authenticated key establishment scheme based on fog computing for healthcare system
Frontiers of Computer Science,
2022
DOI:10.1007/s11704-021-0537-z
|
|
|
[5]
|
An improved user authentication scheme for telecare medical information systems
Proceedings of the 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies,
2018
DOI:10.1145/3278576.3278603
|
|
|
[6]
|
An improved user authentication scheme for telecare medical information systems
Proceedings of the 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies,
2018
DOI:10.1145/3278576.3278603
|
|
|