Intelligent two-phase dual authentication framework for Internet of Medical Things

M Asif, M Abrar, A Salam, F Amin, F Ullah, S Shah… - Scientific Reports, 2025 - nature.com
Abstract The Internet of Medical Things (IoMT) has revolutionized healthcare by bringing
real-time monitoring and data-driven treatments. Nevertheless, the security of …

Designing lattice-enabled group authentication scheme based on post-quantum computing in healthcare applications

S Prajapat, G Thakur, P Kumar, AK Das… - Computers and …, 2025 - Elsevier
The quantum crisis presents a grave threat to patient health, the vast and lucrative
healthcare industry, society, and national security. If current cryptographic systems …

Security Analysis and Improvement of Authenticated Key Agreement Protocol for Remote Patient Monitoring IoMT

D Gautam, G Thakur, MS Obaidat… - 2024 International …, 2024 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) is a network of medical devices, hardware
infrastructure, and software that accumulates real-time data through remote monitoring and …

Efficient implementation of the linear layer of block ciphers with large MDS matrices based on a new lookup table technique

TT Luong, N Van Long, B Vo - PLOS ONE, 2024 - journals.plos.org
Block cipher is a cryptographic field that is now widely applied in various domains. Besides
its security, deployment issues, implementation costs, and flexibility across different …

Blockchain-Assisted Cross-Platform Authentication Protocol with Conditional Traceability for Metaverse Environment in Web 3.0

G Thakur, D Gautam, P Kumar, AK Das… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
The preface of the permeated metaverse together with Web 3.0, has confluenced virtual and
physical reality and can revolutionize social networks, healthcare, gaming and the …

Blockchain-envisioned arbitrable multimedia data auditing based on post quantum computing paradigm in iot

Data auditing is becoming increasingly important as numerous users want to outsource
large multimedia data from the Internet of Things (IoT) devices to the cloud. This is because …

On Security Level of Some Secret Keys of Concealing-Restoring System Aimed to BCI/BMI Security

T Fujii, S Yamamoto, T Yamasaki… - … Computer and Energy …, 2024 - ieeexplore.ieee.org
We study the concealing-restoring system (CRS) for analog signals. CRS conceals any
analog signal using some random-noise disturbances, and splits it into some concealed …

Cryptanalysis and Improvement of Scheme on Wireless Sensor Networks for Agriculture Monitoring

S Prajapat, Anchana, P Kumar - … Health Informatics: A Systems Approach to …, 2024 - Springer
Global economic development is significantly influenced by agriculture. A quarter of the
population of India relies on agriculture to earn a living, making it the largest source of …