Skip to main content

and
  1. Article

    A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography

    Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical functions such as remote disease diagnosis, treatment, and h...

    Yulei Chen, Jianhua Chen in Multimedia Tools and Applications (2023)

  2. No Access

    Article

    An efficient mutual authentication and key agreement scheme without password for wireless sensor networks

    Wireless sensor networks (WSNs) are usually deployed in hostile or unattended areas, and users need to obtain real-time data from WSNs. The data collected by sensor nodes are usually relatively private and sen...

    Yulei Chen, Jianhua Chen in The Journal of Supercomputing (2021)

  3. No Access

    Article

    A secure three-factor-based authentication with key agreement protocol for e-Health clouds

    The rapid development of electronic healthcare (e-Health) has brought great convenience to people’s life. In order to guarantee the security of users, a large number of identity authentication protocols have b...

    Yulei Chen, Jianhua Chen in The Journal of Supercomputing (2021)

  4. No Access

    Article

    Anonymous and provably secure authentication protocol using self-certified cryptography for wireless sensor networks

    The rapid development of wireless sensor networks (WSNs) has brought great convenience to people’s lives, as well as huge security challenges. Recently, Kaur et al. proposed an improved user authentication pro...

    Yulei Chen, Jianhua Chen in Multimedia Tools and Applications (2021)