R. C. Alvarez, The promise of e-health -a canadian perspective, Ehealth international, vol.1, issue.1, 2002.

C. Pang and D. Hansen, Improved record linkage for encrypted identifying data, pp.164-168, 2006.

R. Addas and N. Zhang, An Enhanced Approach to Supporting Controlled Access to EPRs with Three Levels of Identity Privacy Preservations, Lecture Notes in Computer Science, vol.21, issue.3, pp.547-561, 2011.
DOI : 10.1145/359340.359342

R. M. Needham and M. D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM, vol.21, issue.12, pp.993-999, 1978.
DOI : 10.1145/359657.359659

G. Lowe, An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters, vol.56, issue.3, pp.131-133, 1995.
DOI : 10.1016/0020-0190(95)00144-2

I. G. Kim and J. Y. Choi, Formal verification of pap and eap-md5 protocols in wireless networks: Fdr model checking, Advanced Information Networking and Applications 18th International Conference on, pp.264-269, 2004.

G. Lowe, Casper: a compiler for the analysis of security protocols, pp.18-30, 1997.

I. G. Kim, H. S. Kim, J. Y. Lee, and J. Y. Choi, Analysis and modification of ask mobile security protocol, Mobile Commerce and Services, 2005. WMCS '05. The Second IEEE International Workshop on, pp.79-83, 2005.

H. S. Kim, J. H. Oh, J. Y. Choi, and J. W. Kim, The Vulnerabilities Analysis and Design of the Security Protocol for RFID System, The Sixth IEEE International Conference on Computer and Information Technology (CIT'06), pp.152-152, 2006.
DOI : 10.1109/CIT.2006.180

P. Chan, R. Lee, and D. Kramer, The Java Class Libraries, 1999.

H. Gilbert and H. Handschuh, Security Analysis of SHA-256 and Sisters, Selected Areas in Cryptography, vol.3006, pp.175-193, 2004.
DOI : 10.1007/978-3-540-24654-1_13

J. Blömer and J. P. Seifert, Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)
DOI : 10.1007/978-3-540-45126-6_12

R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

D. Wagner and B. Schneier, Analysis of the ssl 3.0 protocol, proceedings of the second Unix Workshop on electronic commerce, USENIX Association, pp.29-40, 1996.