[HTML][HTML] Federated learning for secure IoMT-applications in smart healthcare systems: A comprehensive review

S Rani, A Kataria, S Kumar, P Tiwari - Knowledge-based systems, 2023 - Elsevier
Recent developments in the Internet of Things (IoT) and various communication
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …

Recent advances in the internet-of-medical-things (IoMT) systems security

A Ghubaish, T Salman, M Zolanvari… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-
machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to …

Csef: cloud-based secure and efficient framework for smart medical system using ecc

A Kumari, V Kumar, MY Abbasi, S Kumari… - IEEE …, 2020 - ieeexplore.ieee.org
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …

PALK: Password-based anonymous lightweight key agreement framework for smart grid

AA Khan, V Kumar, M Ahmad, S Rana… - International Journal of …, 2020 - Elsevier
Smart grid (SG) is a highly efficient and more reliable framework that controls the computer,
automation, new technologies and equipment. In SG, electricity utilization and …

REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system

M Tanveer, A Alkhayyat, SA Chaudhry, YB Zikria… - IEEE …, 2022 - ieeexplore.ieee.org
The phenomenal growth of smartphones and wearable devices has begun crowd-sourcing
applications for the Internet of Things (IoT). E-healthcare is considered the essential service …

SCB-HC-ECC–based privacy safeguard protocol for secure cloud storage of smart card–based health care system

S Senthilkumar, K Brindha, N Kryvinska… - Frontiers in Public …, 2021 - frontiersin.org
The advent of the internet has brought an era of unprecedented connectivity between
networked devices, making one distributed computing, called cloud computing, and popular …

Public key versus symmetric key cryptography in client–server authentication protocols

A Braeken - International Journal of Information Security, 2022 - Springer
Every month, several new protocols are pop** up, comparing themselves with a few
others and claiming to outperform the whole state of the art. The most popular domain of …

A cryptography and machine learning based authentication for secure data-sharing in federated cloud services environment

AK Singh, D Saxena - Journal of Applied Security Research, 2022 - Taylor & Francis
Secure mutual authentication is an indispensable requirement to share organizational
invaluable data among collaborating entities in federated cloud environment. This work …