A lightweight image encryption algorithm based on message passing and chaotic map

H Liu, B Zhao, J Zou, L Huang… - Security and …, 2020 - Wiley Online Library
The popularization of 5G and the development of cloud computing further promote the
application of images. The storage of images in an untrusted environment has a great risk of …

An improved anonymous authentication protocol for wearable health monitoring systems

J Mo, W Shen, W Pan - Wireless Communications and Mobile …, 2020 - Wiley Online Library
Wearable health monitoring system (WHMS), which helps medical professionals to collect
patients' healthcare data and provides diagnosis via mobile devices, has become …

[HTML][HTML] A Practically Secure Two-Factor and Mutual Authentication Protocol for Distributed Wireless Sensor Networks Using PUF

J Mo, Z Zhang, Y Lin - Electronics, 2024 - mdpi.com
In a distributed wireless sensor network (DWSN), sensors continuously perceive the
environment, collect data, and transmit it to remote users through the network so as to …

An efficient and secure smart card based authentication scheme

CM Chen, B **ang, KH Wang, Y Zhang… - Journal of Internet …, 2019 - jit.ndhu.edu.tw
Remote user authentication schemes are helpful to provide authenticity between users and
a remote server in network-based services. In order to meet the security requirements, many …

[PDF][PDF] Security Analysis on an Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems

G Eom, H Byeon, Y Choi - International Journal of Advanced …, 2022 - researchgate.net
The wearable health monitoring system (WHMS) plays a significant role in medical experts
collecting and using patient medical data. The WHMS is becoming more popular than in the …

[PDF][PDF] ISeCure

H Aljoaey, K Almutawa, R Alabdali, DM Ibrahim - 2020 - researchgate.net
Web application protection is today's most important battleground between the victim,
intruder, and web service resource. User authentication tends to be critical when a legitimate …