These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
24. Anonymous three-party password-authenticated key exchange scheme for Telecare Medical Information Systems. Xie Q, Hu B, Dong N, Wong DS. PLoS One; 2014; 9(7):e102747. PubMed ID: 25047235 [Abstract] [Full Text] [Related]
27. On the security of a dynamic ID-based authentication scheme for telecare medical information systems. Lin HY. J Med Syst; 2013 Apr; 37(2):9929. PubMed ID: 23345092 [Abstract] [Full Text] [Related]
29. Construction of a Chaotic Map-Based Authentication Protocol for TMIS. Dharminder D, Kundu N, Mishra D. J Med Syst; 2021 Jul 02; 45(8):77. PubMed ID: 34213620 [Abstract] [Full Text] [Related]
30. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems. Lou DC, Lee TF, Lin TH. J Med Syst; 2015 May 02; 39(5):58. PubMed ID: 25795325 [Abstract] [Full Text] [Related]
31. An efficient authentication scheme for telecare medicine information systems. Zhu Z. J Med Syst; 2012 Dec 02; 36(6):3833-8. PubMed ID: 22527784 [Abstract] [Full Text] [Related]
33. On the security of two remote user authentication schemes for telecare medical information systems. Kim KW, Lee JD. J Med Syst; 2014 May 02; 38(5):17. PubMed ID: 24777588 [Abstract] [Full Text] [Related]
39. A Robust and Anonymous Two Factor Authentication and Key Agreement Protocol for Telecare Medicine Information Systems. Xiong H, Tao J, Chen Y. J Med Syst; 2016 Nov 02; 40(11):228. PubMed ID: 27628729 [Abstract] [Full Text] [Related]
40. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System. Li CT, Wu TY, Chen CL, Lee CC, Chen CM. Sensors (Basel); 2017 Jun 23; 17(7):. PubMed ID: 28644381 [Abstract] [Full Text] [Related] Page: [Previous] [Next] [New Search]