Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

LNSC: A security model for electric vehicle and charging pile management based on blockchain ecosystem

X Huang, C Xu, P Wang, H Liu - IEEE access, 2018 - ieeexplore.ieee.org
The Internet of Energy (IoE) provides an effective networking technology for distributed
green energy, which allows the connection of energy anywhere at any time. As an important …

Government regulations in cyber security: Framework, standards and recommendations

J Srinivas, AK Das, N Kumar - Future generation computer systems, 2019 - Elsevier
Cyber security refers to the protection of Internet-connected systems, such as hardware,
software as well as data (information) from cyber attacks (adversaries). A cyber security …

Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks

Q Jiang, S Zeadally, J Ma, D He - Ieee Access, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the
components of the Internet of Things, and will become globally addressable by any entity …

Understanding node capture attacks in user authentication schemes for wireless sensor networks

C Wang, D Wang, Y Tu, G Xu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Despite decades of intensive research, it is still challenging to design a practical multi-factor
user authentication scheme for wireless sensor networks (WSNs). This is because protocol …

Design of secure and lightweight authentication protocol for wearable devices environment

AK Das, M Wazid, N Kumar, MK Khan… - IEEE journal of …, 2017 - ieeexplore.ieee.org
Wearable devices are used in various applications to collect information including step
information, slee** cycles, workout statistics, and health-related information. Due to the …

Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0

C Wang, D Wang, G Xu, D He - Science China Information Sciences, 2022 - Springer
Abstract Industry 4.0, which combines information technology, network and industrial
production, is expected to have a tremendous impact on our daily lives. In such a complex …

A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography

D Sadhukhan, S Ray, GP Biswas, MK Khan… - The Journal of …, 2021 - Springer
Internet of things (IoT) has become a new era of communication technology for performing
information exchange. With the immense increment of usage of smart devices, IoT services …

Secure message communication protocol among vehicles in smart city

A Dua, N Kumar, AK Das… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Secure messages exchange among different vehicles is one of the most challenging tasks in
future smart cities. Any malicious activity has the potential to compromise the confidentiality …