A survey on security and authentication in wireless body area networks

B Narwal, AK Mohapatra - Journal of Systems Architecture, 2021 - Elsevier
Abstract Wireless Body Area Networks (WBAN) is often envisioned as a paradigm shift from
the traditional healthcare system to the modern E-Healthcare system. The patient's vitals …

A lightweight authentication protocol for UAV networks based on security and computational resource optimization

Y Lei, L Zeng, YX Li, MX Wang, H Qin - IEEE Access, 2021 - ieeexplore.ieee.org
The widespread use of Unmanned Aerial Vehicles (UAV) has made the security and
computing resource application efficiency of UAV a hot topic in the security field of the …

TFAS: two factor authentication scheme for blockchain enabled IoMT using PUF and fuzzy extractor

N Singh, AK Das - The Journal of Supercomputing, 2024 - Springer
Security vulnerabilities associated with Internet of Medical Things (IoMT) may lead to health
disasters. The researchers already have designed several lightweight authentication …

[HTML][HTML] Biometric template attacks and recent protection mechanisms: A survey

SM Abdullahi, S Sun, B Wang, N Wei, H Wang - Information Fusion, 2024 - Elsevier
It is an undeniable fact that biometric recognition systems are susceptible to different
software-related or template attacks at different vulnerable points in the biometric …

A review of supervised classification based on contrast patterns: Applications, trends, and challenges

O Loyola-González, MA Medina-Pérez… - Journal of Grid …, 2020 - Springer
Supervised classification based on Contrast Patterns (CP) is a trending topic in the pattern
recognition literature, partly because it contains an important family of both understandable …

Understanding security failures of multi-factor authentication schemes for multi-server environments

D Wang, X Zhang, Z Zhang, P Wang - Computers & Security, 2020 - Elsevier
Revealing the security flaws of existing cryptographic protocols is the key to understanding
how to achieve better security. Dozens of multi-factor authentication schemes for multi …

Securing electronic healthcare records: A mobile-based biometric authentication approach

JJ Hathaliya, S Tanwar, R Evans - Journal of Information Security and …, 2020 - Elsevier
Abstract In the Healthcare 4.0 era, recent breakthroughs in emerging and disruptive
technologies, such as Artificial Intelligence (AI), machine learning and robotics, have …

ITSSAKA-MS: An improved three-factor symmetric-key based secure AKA scheme for multi-server environments

Z Ali, S Hussain, RHU Rehman, A Munshi… - IEEE …, 2020 - ieeexplore.ieee.org
A variety of three-factor smart-card based schemes, specifically designed for telecare
medicine information systems (TMIS) are available for remote user authentication. Most of …

The application of multi-server authentication scheme in internet banking transaction environments

CH Tsai, PC Su - Information systems and e-business management, 2021 - Springer
Abstract Information and communication technology has altered businesses' operations,
with a host of established and new banks launching online banking products and services …

A cloud-guided feature extraction approach for image retrieval in mobile edge computing

S Wang, C Ding, N Zhang, X Liu, A Zhou… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Mobile Edge Computing (MEC) can facilitate various important image retrieval applications
for mobile users by offloading partial computation tasks from resource-limited mobile …