[HTML][HTML] Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology
Modern information technology has been utilized progressively to store and distribute a
large amount of healthcare data to reduce costs and improve medical facilities. In this …
large amount of healthcare data to reduce costs and improve medical facilities. In this …
Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme
Wireless sensor networks (WSNs) can be deployed in any unattended environment. With
new enhancements in internet of things (IoT) technology, authorized users are able to …
new enhancements in internet of things (IoT) technology, authorized users are able to …
[Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server
Everyone desires to avail online services provided by different service providers securely,
efficiently, and effectively. In this regard, security is still a significant concern for them …
efficiently, and effectively. In this regard, security is still a significant concern for them …
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks
J Wang, Y Zhu - Journal of Network and Computer Applications, 2020 - Elsevier
Abstract Recently Ying and Nayak proposed a multi-server supported lightweight
authentication protocol for 5G networks and confirmed the security of their protocol against …
authentication protocol for 5G networks and confirmed the security of their protocol against …
Three-factor UCSSO scheme with fast authentication and privacy protection for telecare medicine information systems
CL Hsu, TV Le, MC Hsieh, KY Tsai, CF Lu… - IEEE Access, 2020 - ieeexplore.ieee.org
Electronic healthcare (e-health) has gained more and more research attention in recent
years, due to its flexibility and convenience. E-health is efficiently enabled by telecare …
years, due to its flexibility and convenience. E-health is efficiently enabled by telecare …
DDMIA: distributed dynamic mutual identity authentication for referrals in blockchain-based health care networks
Patients go to multiple healthcare providers for treatment, and their health data is generally
distributed among providers. The distributed health data and the decentralized health care …
distributed among providers. The distributed health data and the decentralized health care …
A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
Abstract The security for Telecare Medicine Information Systems (TMIS) has been crucial for
reliable dispensing of the medical services to patients at distant locations. Security and …
reliable dispensing of the medical services to patients at distant locations. Security and …
An enhanced and provably secure chaotic map-based authenticated key agreement in multi-server architecture
In the multi-server authentication (MSA) paradigm, a subscriber might avail multiple services
of different service providers, after registering from registration authority. In this approach …
of different service providers, after registering from registration authority. In this approach …
Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme
Telecare medical information systems (TMIS) allow patients remotely login medical service
providers to acquire their medical information and track their health status through …
providers to acquire their medical information and track their health status through …
An ECC-based mutual data access control protocol for next-generation public cloud
Through the broad usage of cloud computing and the extensive utilization of next-generation
public clouds, people can share valuable information worldwide via a wireless medium …
public clouds, people can share valuable information worldwide via a wireless medium …