• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4630240)   Today's Articles (1992)   Subscriber (49746)
For: Chen H, Ge L, Xie L. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks. Sensors (Basel) 2015;15:17057-75. [PMID: 26184224 PMCID: PMC4541922 DOI: 10.3390/s150717057] [Citation(s) in RCA: 20] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/07/2015] [Revised: 07/04/2015] [Accepted: 07/10/2015] [Indexed: 11/30/2022]
Number Cited by Other Article(s)
1
Khan HU, Ali Y. Modeling security evaluation framework for IoHT-driven systems using integrated decision-making methodology. Sci Rep 2024;14:12233. [PMID: 38806575 PMCID: PMC11133348 DOI: 10.1038/s41598-024-62066-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/05/2024] [Accepted: 05/13/2024] [Indexed: 05/30/2024]  Open
2
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks. SENSORS 2016;16:424. [PMID: 27023540 PMCID: PMC4850938 DOI: 10.3390/s16040424] [Citation(s) in RCA: 53] [Impact Index Per Article: 6.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/31/2015] [Revised: 03/08/2016] [Accepted: 03/17/2016] [Indexed: 11/17/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA