128 related articles for article (PubMed ID: 25202737)
1. Time pattern locking scheme for secure multimedia contents in human-centric device.
Kim HW; Kim JH; Park JH; Jeong YS
ScientificWorldJournal; 2014; 2014():796515. PubMed ID: 25202737
[TBL] [Abstract][Full Text] [Related]
2. A rhythm-based authentication scheme for smart media devices.
Lee JD; Jeong YS; Park JH
ScientificWorldJournal; 2014; 2014():781014. PubMed ID: 25110743
[TBL] [Abstract][Full Text] [Related]
3. A Fractal-Based Authentication Technique Using Sierpinski Triangles in Smart Devices.
Ali A; Rafique H; Arshad T; Alqarni MA; Chauhdary SH; Bashir AK
Sensors (Basel); 2019 Feb; 19(3):. PubMed ID: 30736448
[TBL] [Abstract][Full Text] [Related]
4. Sensor based framework for secure multimedia communication in VANET.
Rahim A; Khan ZS; Bin Muhaya FT; Sher M; Kim TH
Sensors (Basel); 2010; 10(11):10146-54. PubMed ID: 22163462
[TBL] [Abstract][Full Text] [Related]
5. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.
Lee TF; Chang IP; Lin TH; Wang CC
J Med Syst; 2013 Jun; 37(3):9941. PubMed ID: 23553734
[TBL] [Abstract][Full Text] [Related]
6. A secure cluster-based multipath routing protocol for WMSNs.
Almalkawi IT; Zapata MG; Al-Karaki JN
Sensors (Basel); 2011; 11(4):4401-24. PubMed ID: 22163854
[TBL] [Abstract][Full Text] [Related]
7. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.
Qiu S; Xu G; Ahmad H; Guo Y
PLoS One; 2018; 13(3):e0194072. PubMed ID: 29547619
[TBL] [Abstract][Full Text] [Related]
8. A game-theoretical approach to multimedia social networks security.
Liu E; Liu Z; Shao F; Zhang Z
ScientificWorldJournal; 2014; 2014():791690. PubMed ID: 24977226
[TBL] [Abstract][Full Text] [Related]
9. Security enhanced multi-factor biometric authentication scheme using bio-hash function.
Choi Y; Lee Y; Moon J; Won D
PLoS One; 2017; 12(5):e0176250. PubMed ID: 28459867
[TBL] [Abstract][Full Text] [Related]
10. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.
Khan MK; Alghathbar K
Sensors (Basel); 2010; 10(3):2450-9. PubMed ID: 22294935
[TBL] [Abstract][Full Text] [Related]
11. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.
Das AK
J Med Syst; 2015 Mar; 39(3):25. PubMed ID: 25666924
[TBL] [Abstract][Full Text] [Related]
12. On the security of two remote user authentication schemes for telecare medical information systems.
Kim KW; Lee JD
J Med Syst; 2014 May; 38(5):17. PubMed ID: 24777588
[TBL] [Abstract][Full Text] [Related]
13. A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography.
Chaudhry SA; Khan MT; Khan MK; Shon T
J Med Syst; 2016 Nov; 40(11):230. PubMed ID: 27646969
[TBL] [Abstract][Full Text] [Related]
14. A user authentication scheme using physiological and behavioral biometrics for multitouch devices.
Koong CS; Yang TI; Tseng CC
ScientificWorldJournal; 2014; 2014():781234. PubMed ID: 25147864
[TBL] [Abstract][Full Text] [Related]
15. Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
Amin R; Islam SK; Biswas GP; Khan MK; Obaidat MS
J Med Syst; 2015 Nov; 39(11):137. PubMed ID: 26324169
[TBL] [Abstract][Full Text] [Related]
16. Continuous Authentication against Collusion Attacks.
Lyu P; Cai W; Wang Y
Sensors (Basel); 2022 Jun; 22(13):. PubMed ID: 35808208
[TBL] [Abstract][Full Text] [Related]
17. Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing.
Ehatisham-Ul-Haq M; Azam MA; Loo J; Shuang K; Islam S; Naeem U; Amin Y
Sensors (Basel); 2017 Sep; 17(9):. PubMed ID: 28878177
[TBL] [Abstract][Full Text] [Related]
18. Invisible touch sensors-based smart and disposable door locking system for security applications.
Mehmood MQ; Malik MS; Zulfiqar MH; Khan MA; Zubair M; Massoud Y
Heliyon; 2023 Feb; 9(2):e13586. PubMed ID: 36846675
[TBL] [Abstract][Full Text] [Related]
19. Protecting contacts against privacy leaks in smartphones.
Cha Y; Pak W
PLoS One; 2018; 13(7):e0191502. PubMed ID: 29995881
[TBL] [Abstract][Full Text] [Related]
20. A joint signal processing and cryptographic approach to multimedia encryption.
Mao Y; Wu M
IEEE Trans Image Process; 2006 Jul; 15(7):2061-75. PubMed ID: 16830924
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]