These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
139 related articles for article (PubMed ID: 31499629)
21. A robust anonymous biometric-based authenticated key agreement scheme for multi-server environments. Guo H; Wang P; Zhang X; Huang Y; Ma F PLoS One; 2017; 12(11):e0187403. PubMed ID: 29121050 [TBL] [Abstract][Full Text] [Related]
22. LACP-SG: Lightweight Authentication Protocol for Smart Grids. Tanveer M; Alasmary H Sensors (Basel); 2023 Feb; 23(4):. PubMed ID: 36850907 [TBL] [Abstract][Full Text] [Related]
23. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications. Li X; Niu J; Karuppiah M; Kumari S; Wu F J Med Syst; 2016 Dec; 40(12):268. PubMed ID: 27734256 [TBL] [Abstract][Full Text] [Related]
24. An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree. Yin X; He J; Guo Y; Han D; Li KC; Castiglione A Sensors (Basel); 2020 Oct; 20(20):. PubMed ID: 33050225 [TBL] [Abstract][Full Text] [Related]
25. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks. Nam J; Choo KK; Paik J; Won D ScientificWorldJournal; 2014; 2014():802359. PubMed ID: 25309956 [TBL] [Abstract][Full Text] [Related]
26. Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak. Braeken A Sensors (Basel); 2020 Apr; 20(8):. PubMed ID: 32290358 [TBL] [Abstract][Full Text] [Related]
27. Robust ECC-based authenticated key agreement scheme with privacy protection for Telecare medicine information systems. Zhang L; Zhu S J Med Syst; 2015 May; 39(5):49. PubMed ID: 25732081 [TBL] [Abstract][Full Text] [Related]
28. A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS. Amin R; Biswas GP J Med Syst; 2015 Mar; 39(3):33. PubMed ID: 25681100 [TBL] [Abstract][Full Text] [Related]
29. A remote password authentication scheme for multiserver architecture using neural networks. Li LH; Lin LC; Hwang MS IEEE Trans Neural Netw; 2001; 12(6):1498-504. PubMed ID: 18249979 [TBL] [Abstract][Full Text] [Related]
30. An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography. Amin R; Islam SK; Biswas GP; Khan MK; Kumar N J Med Syst; 2015 Nov; 39(11):180. PubMed ID: 26433889 [TBL] [Abstract][Full Text] [Related]
31. P/Key: PUF based second factor authentication. Uysal E; Akgün M PLoS One; 2023; 18(2):e0280181. PubMed ID: 36758004 [TBL] [Abstract][Full Text] [Related]
32. Cryptographic framework for document-objects resulting from multiparty collaborative transactions. Goh A Stud Health Technol Inform; 2000; 77():1069-73. PubMed ID: 11187485 [TBL] [Abstract][Full Text] [Related]
33. On the security flaws in ID-based password authentication schemes for telecare medical information systems. Mishra D J Med Syst; 2015 Jan; 39(1):154. PubMed ID: 25486891 [TBL] [Abstract][Full Text] [Related]
34. A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography. Chaudhry SA; Khan MT; Khan MK; Shon T J Med Syst; 2016 Nov; 40(11):230. PubMed ID: 27646969 [TBL] [Abstract][Full Text] [Related]
35. On the security of a simple three-party key exchange protocol without server's public keys. Nam J; Choo KK; Park M; Paik J; Won D ScientificWorldJournal; 2014; 2014():479534. PubMed ID: 25258723 [TBL] [Abstract][Full Text] [Related]
36. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. Nam J; Choo KK; Han S; Kim M; Paik J; Won D PLoS One; 2015; 10(4):e0116709. PubMed ID: 25849359 [TBL] [Abstract][Full Text] [Related]
37. A Password Meter without Password Exposure. Kim P; Lee Y; Hong YS; Kwon T Sensors (Basel); 2021 Jan; 21(2):. PubMed ID: 33419094 [TBL] [Abstract][Full Text] [Related]
38. A new lattice-based password authenticated key exchange scheme with anonymity and reusable key. Seyhan K; Akleylek S PeerJ Comput Sci; 2024; 10():e1791. PubMed ID: 38435543 [TBL] [Abstract][Full Text] [Related]
39. An Authentication Protocol for Future Sensor Networks. Bilal M; Kang SG Sensors (Basel); 2017 Apr; 17(5):. PubMed ID: 28452937 [TBL] [Abstract][Full Text] [Related]
40. Security enhanced multi-factor biometric authentication scheme using bio-hash function. Choi Y; Lee Y; Moon J; Won D PLoS One; 2017; 12(5):e0176250. PubMed ID: 28459867 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]