Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment

B Bera, D Chattaraj, AK Das - Computer Communications, 2020 - Elsevier
In recent years, the Internet of Drones (IoD) has emerged as an important research topic in
the academy and industry because it has several potential applications ranging from the …

An anonymous pre-authentication and post-authentication scheme assisted by cloud for medical IoT environments

R Vinoth, LJ Deborah, P Vijayakumar… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) environment assisted by a cloud server is an emerging
conceptual model which incorporates the benefits of both IoT and cloud. In such an …

HTMLPhish: Enabling phishing web page detection by applying deep learning techniques on HTML analysis

C Opara, B Wei, Y Chen - 2020 International Joint Conference …, 2020 - ieeexplore.ieee.org
Recently, the development and implementation of phishing attacks require little technical
skills and costs. This uprising has led to an ever-growing number of phishing attacks on the …

[HTML][HTML] Look before you leap: Detecting phishing web pages by exploiting raw URL and HTML characteristics

C Opara, Y Chen, B Wei - Expert Systems with Applications, 2024 - Elsevier
Phishing websites distribute unsolicited content and are frequently used to commit email
and internet fraud. Detecting them before any user information is submitted is critical …

A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme

S Barman, HPH Shum, S Chattopadhyay… - IEEE …, 2019 - ieeexplore.ieee.org
Smart card-based remote authentication schemes are widely used in multi-medical-server-
based telecare medicine information systems (TMISs). Biometric is one of the most …

Designing fine-grained access control for software-defined networks using private blockchain

D Chattaraj, B Bera, AK Das… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Emerging next-generation Internet yields proper administration of a wide-ranging dynamic
network to assist rapid ubiquitous resource accessibility, whilst providing higher channel …

A secure biometrics and PUFs-based authentication scheme with key agreement for multi-server environments

J Zhao, W Bian, D Xu, B Jie, X Ding, W Zhou… - Ieee …, 2020 - ieeexplore.ieee.org
The emergence of multi-server authentication key protocol schemes provides a viable
environment for users to easily access the services of multiple legitimate servers through a …

Suppressed K-anonymity multi-factor authentication based schmidt-samoa cryptography for privacy preserved data access in cloud computing

KM Prabha, PV Saraswathi - Computer Communications, 2020 - Elsevier
Security and privacy-preservation is a significant problem to be solved in the cloud when
accessing data services. The existing authentication technique verifies the client identity …

Provably secure multi-server authentication protocol using fuzzy commitment

S Barman, AK Das, D Samanta, S Chattopadhyay… - IEEE …, 2018 - ieeexplore.ieee.org
Remote user authentication is a cryptographic mechanism through which a remote server
verifies the legitimacy of an authorized user over an insecure communication channel. Most …