[HTML][HTML] Federated learning for secure IoMT-applications in smart healthcare systems: A comprehensive review
Recent developments in the Internet of Things (IoT) and various communication
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …
Recent advances in the internet-of-medical-things (IoMT) systems security
The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-
machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to …
machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to …
Csef: cloud-based secure and efficient framework for smart medical system using ecc
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …
manner. There are various technologies used in smart architecture such as cloud …
PALK: Password-based anonymous lightweight key agreement framework for smart grid
Smart grid (SG) is a highly efficient and more reliable framework that controls the computer,
automation, new technologies and equipment. In SG, electricity utilization and …
automation, new technologies and equipment. In SG, electricity utilization and …
REAS-TMIS: Resource-efficient authentication scheme for telecare medical information system
The phenomenal growth of smartphones and wearable devices has begun crowd-sourcing
applications for the Internet of Things (IoT). E-healthcare is considered the essential service …
applications for the Internet of Things (IoT). E-healthcare is considered the essential service …
SCB-HC-ECC–based privacy safeguard protocol for secure cloud storage of smart card–based health care system
The advent of the internet has brought an era of unprecedented connectivity between
networked devices, making one distributed computing, called cloud computing, and popular …
networked devices, making one distributed computing, called cloud computing, and popular …
Public key versus symmetric key cryptography in client–server authentication protocols
A Braeken - International Journal of Information Security, 2022 - Springer
Every month, several new protocols are pop** up, comparing themselves with a few
others and claiming to outperform the whole state of the art. The most popular domain of …
others and claiming to outperform the whole state of the art. The most popular domain of …
A cryptography and machine learning based authentication for secure data-sharing in federated cloud services environment
Secure mutual authentication is an indispensable requirement to share organizational
invaluable data among collaborating entities in federated cloud environment. This work …
invaluable data among collaborating entities in federated cloud environment. This work …