A lightweight image encryption algorithm based on message passing and chaotic map
H Liu, B Zhao, J Zou, L Huang… - Security and …, 2020 - Wiley Online Library
The popularization of 5G and the development of cloud computing further promote the
application of images. The storage of images in an untrusted environment has a great risk of …
application of images. The storage of images in an untrusted environment has a great risk of …
An improved anonymous authentication protocol for wearable health monitoring systems
J Mo, W Shen, W Pan - Wireless Communications and Mobile …, 2020 - Wiley Online Library
Wearable health monitoring system (WHMS), which helps medical professionals to collect
patients' healthcare data and provides diagnosis via mobile devices, has become …
patients' healthcare data and provides diagnosis via mobile devices, has become …
[HTML][HTML] A Practically Secure Two-Factor and Mutual Authentication Protocol for Distributed Wireless Sensor Networks Using PUF
J Mo, Z Zhang, Y Lin - Electronics, 2024 - mdpi.com
In a distributed wireless sensor network (DWSN), sensors continuously perceive the
environment, collect data, and transmit it to remote users through the network so as to …
environment, collect data, and transmit it to remote users through the network so as to …
An efficient and secure smart card based authentication scheme
Remote user authentication schemes are helpful to provide authenticity between users and
a remote server in network-based services. In order to meet the security requirements, many …
a remote server in network-based services. In order to meet the security requirements, many …
[PDF][PDF] Security Analysis on an Improved Anonymous Authentication Protocol for Wearable Health Monitoring Systems
G Eom, H Byeon, Y Choi - International Journal of Advanced …, 2022 - researchgate.net
The wearable health monitoring system (WHMS) plays a significant role in medical experts
collecting and using patient medical data. The WHMS is becoming more popular than in the …
collecting and using patient medical data. The WHMS is becoming more popular than in the …
[PDF][PDF] ISeCure
H Aljoaey, K Almutawa, R Alabdali, DM Ibrahim - 2020 - researchgate.net
Web application protection is today's most important battleground between the victim,
intruder, and web service resource. User authentication tends to be critical when a legitimate …
intruder, and web service resource. User authentication tends to be critical when a legitimate …