[PDF][PDF] Secure remote user authentication scheme on health care, IoT and cloud applications: a multilayer systematic survey
Secure remote user authentication is an authentication technique in which the remote server
authorizes the identity of the user through an insecure communication network. Since then …
authorizes the identity of the user through an insecure communication network. Since then …
Elliptic curve signcryption-based mutual authentication protocol for smart cards
In the modern computing environment, smart cards are being used extensively, which are
intended to authenticate a user with the system or server. Owing to the constrictions of …
intended to authenticate a user with the system or server. Owing to the constrictions of …
SV2VCS: a secure vehicle-to-vehicle communication scheme based on lightweight authentication and concurrent data collection trees
Vehicle-to-vehicle communication is one of the new paradigms of networking that should be
secure, fast, and efficient. In this paper, we have proposed a secure framework that is based …
secure, fast, and efficient. In this paper, we have proposed a secure framework that is based …
Simple, secure, and lightweight mechanism for mutual authentication of nodes in tiny wireless sensor networks
Wireless sensor networks (WSNs) are widely used in large areas of applications; due to
advancements in technology, very tiny sensors are readily available, and their usage …
advancements in technology, very tiny sensors are readily available, and their usage …
A novel and provably secure mutual authentication protocol for cloud environment using elliptic curve cryptography and fuzzy verifier
Cloud computing is an emerging paradigm that enables on‐demand data storage without
considering the local infrastructure limitations of end‐users. The extensive growth in number …
considering the local infrastructure limitations of end‐users. The extensive growth in number …
Trends in Remote User Authentication Based on Smart Card and External Memory
This research performs a literature survey of remote user authentication researches based
on smart card and external memory. The main security confidence of smart card based …
on smart card and external memory. The main security confidence of smart card based …
A security protocol of RFID communication system based on password authenticated with provable security
K Li, J Liu - International Journal of Autonomous and …, 2021 - inderscienceonline.com
Radio frequency identification (RFID) technology is a non-contact automatic identification
technology. However, due to the limitations of RFID equipment, RFID technology still has …
technology. However, due to the limitations of RFID equipment, RFID technology still has …