State of the art: secure mobile payment

W Liu, X Wang, W Peng - IEEE Access, 2020‏ - ieeexplore.ieee.org
With mobile payments popular around the world, payers can conduct a payment anytime
and anywhere. While providing great convenience, mobile payment also brings many …

Block-secure: Blockchain based scheme for secure P2P cloud storage

J Li, J Wu, L Chen - Information Sciences, 2018‏ - Elsevier
With the development of Internet technology, the volume of data is increasing tremendously.
To tackle with large-scale data, more and more applications choose to enlarge the storage …

Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications

S Roy, AK Das, S Chatterjee, N Kumar… - IEEE Transactions …, 2018‏ - ieeexplore.ieee.org
Mobile cloud computing (MCC) allows mobile users to have on-demand access to cloud
services. A mobile cloud model helps in analyzing the information regarding the patients' …

Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications

CM Chen, KH Wang, KH Yeh, B **ang… - Journal of Ambient …, 2019‏ - Springer
A secure authenticated key exchange protocol is an essential key to bootstrap a secure
wireless communication. Various research have been conducted to study the efficiency and …

Design of a provably secure biometrics-based multi-cloud-server authentication scheme

S Kumari, X Li, F Wu, AK Das, KKR Choo… - Future Generation …, 2017‏ - Elsevier
Abstract Big Data and Cloud of Things (CoT) are two inter-related research trends in our
data-driven society, and one research challenge is to design efficient security solution that …

On the design of provably secure lightweight remote user authentication scheme for mobile cloud computing services

S Roy, S Chatterjee, AK Das, S Chattopadhyay… - IEEE …, 2017‏ - ieeexplore.ieee.org
Secure and efficient lightweight user authentication protocol for mobile cloud computing
becomes a paramount concern due to the data sharing using Internet among the end users …

Trust architecture and reputation evaluation for internet of things

J Chen, Z Tian, X Cui, L Yin, X Wang - Journal of Ambient Intelligence and …, 2019‏ - Springer
Abstract Internet of Things (IoT) represents a fundamental infrastructure and set of
techniques that support innovative services in various application domains. Trust …

Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure

K Mahmood, X Li, SA Chaudhry, H Naqvi… - Future Generation …, 2018‏ - Elsevier
The most vital concern in the realization of the Internet of Things (IoT) is to encounter the
disparate communication systems and technologies. Interoperability solutions such as …

Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment

Q Feng, D He, S Zeadally, H Wang - Future Generation Computer Systems, 2018‏ - Elsevier
Significant advances in wireless communication technologies have led to the emergence
and proliferation of a wide range of mobile devices and mobile services. However, the use of …

A novel visual medical image encryption for secure transmission of authenticated watermarked medical images

S Priya, B Santhi - Mobile networks and applications, 2021‏ - Springer
Secure medical data transmission is the important criteria in tele-medicine. It is helpful for
getting the exact medical information at the remote specialist's side from the local doctor …