[PDF][PDF] An End-to-End Authentication Scheme for Healthcare IoT Systems Using WMSN.

S Nashwan - Computers, Materials & Continua, 2021 - researchgate.net
The healthcare internet of things (IoT) system has dramatically reshaped this important
industry sector. This system employs the latest technology of IoT and wireless medical …

[PDF][PDF] Fully Authentication Services Scheme for NFC Mobile Payment Systems.

M Alshammari, S Nashwan - Intelligent Automation & Soft …, 2022 - researchgate.net
Communication (NFC). Smartphones that support this technology are used in contactless
payment systems as identification devices to emulate credit cards. This technology has …

[PDF][PDF] Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems.

M Alanazi, S Nashwan - Computer Systems Science & …, 2022 - researchgate.net
Wireless medical sensor networks (WMSNs) play a significant role in increasing the
availability of remote healthcare systems. The vital and physiological data of the patient can …

[PDF][PDF] Performance analysis of SAP-NFC protocol

M Al-Fayoumi, S Nashwan - International Journal of …, 2018 - researchgate.net
Near field communication (NFC) is a wireless communication technology. It is one of the
most recent technologies that offers great and varied promise in the area of application …

[PDF][PDF] Delay sensitive protocol for high availability LTE handovers

VO Nyangaresi, SO Abeka, AJ Rodrigues - 2020 - researchgate.net
Long delays during the handover process lead to dropped calls which deteriorate the
network quality of service. In addition, these delays impede the incorporation of …

Secure authentication scheme using Diffie–Hellman key agreement for smart IoT irrigation systems

S Nashwan - Electronics, 2022 - mdpi.com
Smart irrigation is considered one of the most significant agriculture management systems
worldwide, considering the current context of water scarcity. There is a clear consensus that …

[PDF][PDF] SE-H: Secure and efficient hash protocol for RFID system

S Nashwan - … Journal of Communication Networks and Information …, 2017 - researchgate.net
The Radio Frequency Identification (RFID) systems are suffered from the growing of security
vulnerabilities. In the RFID Applications, an attackers may exploit these vulnerabilities to …

[PDF][PDF] Analysis of the Desynchronization Attack Impact on the E2EA Scheme.

S Nashwan - Computer Systems Science & Engineering, 2022 - cdn.techscience.cn
The healthcare IoT system is considered to be a significant and modern medical system.
There is broad consensus that these systems will play a vital role in the achievement of …

[PDF][PDF] Synchronous authentication key management scheme for Inter-eNB handover over LTE networks

S Nashwan - … Journal of Advanced Computer Science and …, 2017 - pdfs.semanticscholar.org
Handover process execution without active session termination is considered one of the
most important attribute in the Long Term Evolution (LTE) networks. Unfortunately, this …

An Analytic Model for Reducing Authentication Signaling Traffic in an End-to-End Authentication Scheme

S Nashwan, IIH Nashwan - Sensors, 2021 - mdpi.com
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes
authenticate each other through the healthcare service provider in three phases: the long …