A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography
Internet of things (IoT) has become a new era of communication technology for performing
information exchange. With the immense increment of usage of smart devices, IoT services …
information exchange. With the immense increment of usage of smart devices, IoT services …
A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications
With the rapid spread of cloud computing and ever increasing big data generated by Internet
of Things (IoT), remote user authentication poses the biggest challenge. Internet of Things is …
of Things (IoT), remote user authentication poses the biggest challenge. Internet of Things is …
A novel approach for securing data against intrusion attacks in unmanned aerial vehicles integrated heterogeneous network using functional encryption technique
As the number of user equipment (UE) in any heterogeneous network (HetNet) assisted by
unmanned aerial vehicles (UAV) continues to grow, so does the number of intruder nodes …
unmanned aerial vehicles (UAV) continues to grow, so does the number of intruder nodes …
Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme
L Zhang, S Zhu, S Tang - IEEE Journal of Biomedical and …, 2016 - ieeexplore.ieee.org
Telecare medicine information systems (TMIS) provide flexible and convenient e-health
care. However, the medical records transmitted in TMIS are exposed to unsecured public …
care. However, the medical records transmitted in TMIS are exposed to unsecured public …
Improvement of a privacy authentication scheme based on cloud for medical environment
SY Chiou, Z Ying, J Liu - Journal of medical systems, 2016 - Springer
Medical systems allow patients to receive care at different hospitals. However, this entails
considerable inconvenience through the need to transport patients and their medical …
considerable inconvenience through the need to transport patients and their medical …
Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme
C Wang, X Zhang, Z Zheng - Plos one, 2016 - journals.plos.org
With the security requirements of networks, biometrics authenticated schemes which are
applied in the multi-server environment come to be more crucial and widely deployed. In this …
applied in the multi-server environment come to be more crucial and widely deployed. In this …
A mutual authentication framework for wireless medical sensor networks
Wireless medical sensor networks (WMSN) comprise of distributed sensors, which can
sense human physiological signs and monitor the health condition of the patient. It is …
sense human physiological signs and monitor the health condition of the patient. It is …
Digital medical records (DMR) security and privacy challenges in smart healthcare system
The major obstacles to the adoption of electronic health records in the healthcare sector are
patient privacy and the security of their data. Data security and patient protection are …
patient privacy and the security of their data. Data security and patient protection are …
A lightweight authentication and key agreement protocol preserving user anonymity
Nowadays with widespread employment of the Internet, servers provide various services for
legal users. The vital issue in client/server connections is authentication protocols that make …
legal users. The vital issue in client/server connections is authentication protocols that make …
A novel approach for securing data against adversary attacks in UAV embedded HetNet using identity based authentication scheme
Abstract Unmanned Aerial Vehicle (UAV) integrated Heterogeneous Network (HetNet) is
currently considered as one of the promising technologies. This technology helps in fulfilling …
currently considered as one of the promising technologies. This technology helps in fulfilling …