Csef: cloud-based secure and efficient framework for smart medical system using ecc

A Kumari, V Kumar, MY Abbasi, S Kumari… - IEEE …, 2020 - ieeexplore.ieee.org
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …

RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing

V Kumar, M Ahmad, D Mishra, S Kumari… - Vehicular …, 2020 - Elsevier
Vehicular cloud computing (VCC) is an emerging research area, which comprises cloud,
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …

Wireless communication based cloud network architecture using AI assisted with IoT for FinTech application

A Khadidos, A Subbalakshmi, A Khadidos, A Alsobhi… - Optik, 2022 - Elsevier
Financial Technology has revolutionized the delivery and usage of the autonomous
operations and processes to improve the financial services. Banks and Financial institutions …

[HTML][HTML] An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach

AA Khan, V Kumar, M Ahmad - Journal of King Saud University-Computer …, 2022 - Elsevier
Smart grid (SG) provides a suitable adjustment in the amount of power generation by
providing the ability to supervise consumer behavior. SG uses in the smart system to …

An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system

K Ma, G Song, Y Zhou, R Xu, B Yang - Computer Standards & Interfaces, 2024 - Elsevier
In recent years, due to the spread of infectious diseases such as COVID-19, people begin to
use the electronic medical system to obtain remote diagnosis and treatment services, which …

[PDF][PDF] RAVCC: robust authentication protocol for RFID based vehicular cloud computing

V Kumar, R Kumar, V Kumar, A Kumari, S Kumari - J. Netw. Intell, 2022 - bit.nkust.edu.tw
Vehicular cloud computing (VCC) stands for vehicle cloud computing, which combines
cloud, vehicular networking, and Internet of Things (IoT) and related technologies. VCC is …

A secure user authentication protocol using elliptic curve cryptography

A Kumari, M Yahya Abbasi, V Kumar… - Journal of Discrete …, 2019 - Taylor & Francis
Authentication is a significant security prerequisite for secure communications. However,
most of identity assisted mutual authentication protocols are requiring of security verification …

Cloud-based authenticated protocol for healthcare monitoring system

P Chandrakar, S Sinha, R Ali - Journal of Ambient Intelligence and …, 2020 - Springer
In this paper, we have developed cloud-based authentication protocol for e-health care
monitoring system which provides a secure platform to the patients. By using this system, the …

Fuzzy rule based intelligent system for user authentication based on user behaviour

A Roy, S Razia, N Parveen, AS Rao… - Journal of Discrete …, 2020 - Taylor & Francis
Security of the data is one of the major concerns now a days. To secure data text–based
authentication vulnerable to attacks like shoulder surfing, hidden cameras and hackers. To …

Security and privacy technique in big data: A review

J Khan, N Ahmad - 2023 10th International Conference on …, 2023 - ieeexplore.ieee.org
A new issue has arisen since the volume of data is constantly increasing and cannot be
solved by conventional analytic methods. Therefore, a new paradigm known as Big Data …