Privacy-preserving secure and low-cost medical data communication scheme for smart healthcare
M Soni, DK Singh - Computer Communications, 2022 - Elsevier
Wireless body area network (WBAN) remotely offers various medical services for the
benefits of patients, doctors, and society in which medical data is transferred between …
benefits of patients, doctors, and society in which medical data is transferred between …
An identity-based authentication protocol for the telecare medical information system (TMIS) using a physically unclonable function
Telecare Medical Information System (TMIS) encourages patients to securely exchange their
health data with a remote medical server for real-time remote diagnosis. During the remote …
health data with a remote medical server for real-time remote diagnosis. During the remote …
A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment
Abstract Use of Internet-of-Things (IoT)-based wireless applications has been exponentially
increased nowadays and likely to accelerate in near future. Thus, a large volume of traffic …
increased nowadays and likely to accelerate in near future. Thus, a large volume of traffic …
A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC
Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector
has evolved significantly in recent years. However, security breaches reveal incorrect …
has evolved significantly in recent years. However, security breaches reveal incorrect …
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture
The emerging cloud infrastructure has escalated number of servers offering flexible and
diverse remote services through public channels. However, user authentication in …
diverse remote services through public channels. However, user authentication in …
MSAUPL: A multi-server authentication and key agreement protocol for industrial IoT based on user privacy level
Y Wu, T Feng, C Su, C Liu - Journal of Information Security and Applications, 2025 - Elsevier
With the rapid development of the Industrial Internet of Things (IIoT), industrial control
systems are characterized by increasing complexity of access users and diversity of data …
systems are characterized by increasing complexity of access users and diversity of data …
Advances in secure knowledge management in the artificial intelligence era
Knowledge management and preservation started thousands of years ago from cave
paintings, representing words by pictures, later moving to books through the invention of …
paintings, representing words by pictures, later moving to books through the invention of …
A mining town in a digital land: browser-based cryptocurrency mining as an alternative to online advertising
Advertising has been the most common strategy for content monetization. However,
behavioral data collection for personalized advertisements has raised privacy concerns …
behavioral data collection for personalized advertisements has raised privacy concerns …
Cost-effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT)
The Internet of Things (IoT) is a network of interconnected objects, which congregate and
exchange gigantic amounts of data. Usually, pre-deployed embedded sensors sense this …
exchange gigantic amounts of data. Usually, pre-deployed embedded sensors sense this …
A provably secure multi-server authentication scheme based on Chebyshev chaotic map
R Chen, Y Mou, W Li - Journal of Information Security and Applications, 2024 - Elsevier
The Internet provides us a lot of online services. Under the conventional single-server
architectures, remote users must register separately on each visited server to obtain the …
architectures, remote users must register separately on each visited server to obtain the …