[PDF][PDF] An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN.
S Nashwan - Computers, Materials & Continua, 2021 - researchgate.net
The healthcare internet of things (IoT) system has dramatically reshaped this important
industry sector. This system employs the latest technology of IoT and wireless medical …
industry sector. This system employs the latest technology of IoT and wireless medical …
[PDF][PDF] Fully Authentication Services Scheme for NFC Mobile Payment Systems.
M Alshammari, S Nashwan - Intelligent Automation & Soft …, 2022 - researchgate.net
Communication (NFC). Smartphones that support this technology are used in contactless
payment systems as identification devices to emulate credit cards. This technology has …
payment systems as identification devices to emulate credit cards. This technology has …
[PDF][PDF] Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems.
M Alanazi, S Nashwan - Computer Systems Science & …, 2022 - researchgate.net
Wireless medical sensor networks (WMSNs) play a significant role in increasing the
availability of remote healthcare systems. The vital and physiological data of the patient can …
availability of remote healthcare systems. The vital and physiological data of the patient can …
[PDF][PDF] Performance analysis of SAP-NFC protocol
Near field communication (NFC) is a wireless communication technology. It is one of the
most recent technologies that offers great and varied promise in the area of application …
most recent technologies that offers great and varied promise in the area of application …
[PDF][PDF] Delay sensitive protocol for high availability LTE handovers
Long delays during the handover process lead to dropped calls which deteriorate the
network quality of service. In addition, these delays impede the incorporation of …
network quality of service. In addition, these delays impede the incorporation of …
Secure authentication scheme using Diffie–Hellman key agreement for smart IoT irrigation systems
S Nashwan - Electronics, 2022 - mdpi.com
Smart irrigation is considered one of the most significant agriculture management systems
worldwide, considering the current context of water scarcity. There is a clear consensus that …
worldwide, considering the current context of water scarcity. There is a clear consensus that …
[PDF][PDF] SE-H: Secure and efficient hash protocol for RFID system
S Nashwan - … Journal of Communication Networks and Information …, 2017 - researchgate.net
The Radio Frequency Identification (RFID) systems are suffered from the growing of security
vulnerabilities. In the RFID Applications, an attackers may exploit these vulnerabilities to …
vulnerabilities. In the RFID Applications, an attackers may exploit these vulnerabilities to …
[PDF][PDF] Analysis of the Desynchronization Attack Impact on the E2EA Scheme.
S Nashwan - Computer Systems Science & Engineering, 2022 - cdn.techscience.cn
The healthcare IoT system is considered to be a significant and modern medical system.
There is broad consensus that these systems will play a vital role in the achievement of …
There is broad consensus that these systems will play a vital role in the achievement of …
[PDF][PDF] Synchronous authentication key management scheme for Inter-eNB handover over LTE networks
S Nashwan - … Journal of Advanced Computer Science and …, 2017 - pdfs.semanticscholar.org
Handover process execution without active session termination is considered one of the
most important attribute in the Long Term Evolution (LTE) networks. Unfortunately, this …
most important attribute in the Long Term Evolution (LTE) networks. Unfortunately, this …
An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes
authenticate each other through the healthcare service provider in three phases: the long …
authenticate each other through the healthcare service provider in three phases: the long …