A privacy-preserving three-factor authentication system for IoT-enabled wireless sensor networks
Recently, Sahoo et al. introduced a three-factor authentication scheme for Wireless Sensor
Networks (WSNs) based on an elliptic curve cryptosystem. Nonetheless, upon closer …
Networks (WSNs) based on an elliptic curve cryptosystem. Nonetheless, upon closer …
An efficient provably secure authentication and key agreement protocol for satellite communication networks
The leverage of satellite resources to establish a communication network offers a wide
range of benefits, including the capability to support news gathering, broadcasting, and …
range of benefits, including the capability to support news gathering, broadcasting, and …
Quantum image encryption protocol for secure communication in healthcare networks
Maintaining patient confidentiality and ensuring data integrity are critical aspects of
healthcare information security. In response to the growing need for enhanced security …
healthcare information security. In response to the growing need for enhanced security …
An improved ultra-lightweight anonymous authenticated key agreement protocol for wearable devices
For wearable devices with constrained computational resources, it is typically required to
offload processing tasks to more capable servers. However, this practice introduces …
offload processing tasks to more capable servers. However, this practice introduces …
BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment
The increasing number of edge layer devices connected to fog servers in fog computing
environments has led to a rise in vulnerable and unauthorized actions. Implementing …
environments has led to a rise in vulnerable and unauthorized actions. Implementing …
[HTML][HTML] A Survey on Exploring the Challenges and Applications of Wireless Body Area Networks (WBANs)
Networks play an important role in the day-to-day life of every individual. Networks are
involved in the transmission of necessary information between the sender and receiver in …
involved in the transmission of necessary information between the sender and receiver in …
Intelligent two-phase dual authentication framework for Internet of Medical Things
Abstract The Internet of Medical Things (IoMT) has revolutionized healthcare by bringing
real-time monitoring and data-driven treatments. Nevertheless, the security of …
real-time monitoring and data-driven treatments. Nevertheless, the security of …
SC-VDTwinAuth: Smart-Contract Assisted Handover Authentication Protocol for Vehicular Digital Twin Network
Vehicular digital twin network is partitioned into multiple networks either due to the
geographical differences or their accelerating expansion, which necessitates a secure and …
geographical differences or their accelerating expansion, which necessitates a secure and …
Designing lattice-enabled group authentication scheme based on post-quantum computing in healthcare applications
The quantum crisis presents a grave threat to patient health, the vast and lucrative
healthcare industry, society, and national security. If current cryptographic systems …
healthcare industry, society, and national security. If current cryptographic systems …
A provably secure authenticated key agreement protocol for industrial sensor network system
The convergence of reliable and self‐organizing characteristics of Wireless Sensor
Networks (WSNs) and the IoT has increased the utilization of WSN in different scenarios …
Networks (WSNs) and the IoT has increased the utilization of WSN in different scenarios …