The promise of e-health -a canadian perspective, Ehealth international, vol.1, issue.1, 2002. ,
Improved record linkage for encrypted identifying data, pp.164-168, 2006. ,
An Enhanced Approach to Supporting Controlled Access to EPRs with Three Levels of Identity Privacy Preservations, Lecture Notes in Computer Science, vol.21, issue.3, pp.547-561, 2011. ,
DOI : 10.1145/359340.359342
Using encryption for authentication in large networks of computers, Communications of the ACM, vol.21, issue.12, pp.993-999, 1978. ,
DOI : 10.1145/359657.359659
An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters, vol.56, issue.3, pp.131-133, 1995. ,
DOI : 10.1016/0020-0190(95)00144-2
Formal verification of pap and eap-md5 protocols in wireless networks: Fdr model checking, Advanced Information Networking and Applications 18th International Conference on, pp.264-269, 2004. ,
Casper: a compiler for the analysis of security protocols, pp.18-30, 1997. ,
Analysis and modification of ask mobile security protocol, Mobile Commerce and Services, 2005. WMCS '05. The Second IEEE International Workshop on, pp.79-83, 2005. ,
The Vulnerabilities Analysis and Design of the Security Protocol for RFID System, The Sixth IEEE International Conference on Computer and Information Technology (CIT'06), pp.152-152, 2006. ,
DOI : 10.1109/CIT.2006.180
The Java Class Libraries, 1999. ,
Security Analysis of SHA-256 and Sisters, Selected Areas in Cryptography, vol.3006, pp.175-193, 2004. ,
DOI : 10.1007/978-3-540-24654-1_13
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES) ,
DOI : 10.1007/978-3-540-45126-6_12
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
Analysis of the ssl 3.0 protocol, proceedings of the second Unix Workshop on electronic commerce, USENIX Association, pp.29-40, 1996. ,