Intelligent two-phase dual authentication framework for Internet of Medical Things
Abstract The Internet of Medical Things (IoMT) has revolutionized healthcare by bringing
real-time monitoring and data-driven treatments. Nevertheless, the security of …
real-time monitoring and data-driven treatments. Nevertheless, the security of …
Designing lattice-enabled group authentication scheme based on post-quantum computing in healthcare applications
The quantum crisis presents a grave threat to patient health, the vast and lucrative
healthcare industry, society, and national security. If current cryptographic systems …
healthcare industry, society, and national security. If current cryptographic systems …
Security Analysis and Improvement of Authenticated Key Agreement Protocol for Remote Patient Monitoring IoMT
The Internet of Medical Things (IoMT) is a network of medical devices, hardware
infrastructure, and software that accumulates real-time data through remote monitoring and …
infrastructure, and software that accumulates real-time data through remote monitoring and …
Efficient implementation of the linear layer of block ciphers with large MDS matrices based on a new lookup table technique
TT Luong, N Van Long, B Vo - PLOS ONE, 2024 - journals.plos.org
Block cipher is a cryptographic field that is now widely applied in various domains. Besides
its security, deployment issues, implementation costs, and flexibility across different …
its security, deployment issues, implementation costs, and flexibility across different …
Blockchain-Assisted Cross-Platform Authentication Protocol with Conditional Traceability for Metaverse Environment in Web 3.0
The preface of the permeated metaverse together with Web 3.0, has confluenced virtual and
physical reality and can revolutionize social networks, healthcare, gaming and the …
physical reality and can revolutionize social networks, healthcare, gaming and the …
Blockchain-envisioned arbitrable multimedia data auditing based on post quantum computing paradigm in iot
Data auditing is becoming increasingly important as numerous users want to outsource
large multimedia data from the Internet of Things (IoT) devices to the cloud. This is because …
large multimedia data from the Internet of Things (IoT) devices to the cloud. This is because …
On Security Level of Some Secret Keys of Concealing-Restoring System Aimed to BCI/BMI Security
T Fujii, S Yamamoto, T Yamasaki… - … Computer and Energy …, 2024 - ieeexplore.ieee.org
We study the concealing-restoring system (CRS) for analog signals. CRS conceals any
analog signal using some random-noise disturbances, and splits it into some concealed …
analog signal using some random-noise disturbances, and splits it into some concealed …
Cryptanalysis and Improvement of Scheme on Wireless Sensor Networks for Agriculture Monitoring
Global economic development is significantly influenced by agriculture. A quarter of the
population of India relies on agriculture to earn a living, making it the largest source of …
population of India relies on agriculture to earn a living, making it the largest source of …