[PDF][PDF] Secure remote user authentication scheme on health care, IoT and cloud applications: a multilayer systematic survey

V Rajasekar, J Premalatha, K Sathya… - Acta Polytechnica …, 2021 - epa.niif.hu
Secure remote user authentication is an authentication technique in which the remote server
authorizes the identity of the user through an insecure communication network. Since then …

Elliptic curve signcryption-based mutual authentication protocol for smart cards

AK Singh, A Solanki, A Nayyar, B Qureshi - Applied Sciences, 2020 - mdpi.com
In the modern computing environment, smart cards are being used extensively, which are
intended to authenticate a user with the system or server. Owing to the constrictions of …

SV2VCS: a secure vehicle-to-vehicle communication scheme based on lightweight authentication and concurrent data collection trees

R Tandon, PK Gupta - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Vehicle-to-vehicle communication is one of the new paradigms of networking that should be
secure, fast, and efficient. In this paper, we have proposed a secure framework that is based …

Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks

U Jain, M Hussain, J Kakarla - International Journal of …, 2020 - Wiley Online Library
Wireless sensor networks (WSNs) are widely used in large areas of applications; due to
advancements in technology, very tiny sensors are readily available, and their usage …

A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier

KA Patel, S Shukla, SJ Patel - Concurrency and Computation …, 2024 - Wiley Online Library
Cloud computing is an emerging paradigm that enables on‐demand data storage without
considering the local infrastructure limitations of end‐users. The extensive growth in number …

Trends in Remote User Authentication Based on Smart Card and External Memory

BA Buhari, AA Obiniyi, SB Junaidu… - International Journal of …, 2022 - igi-global.com
This research performs a literature survey of remote user authentication researches based
on smart card and external memory. The main security confidence of smart card based …

A security protocol of RFID communication system based on password authenticated with provable security

K Li, J Liu - International Journal of Autonomous and …, 2021 - inderscienceonline.com
Radio frequency identification (RFID) technology is a non-contact automatic identification
technology. However, due to the limitations of RFID equipment, RFID technology still has …