An enhanced and provably secure chaotic map-based authenticated key agreement in multi-server architecture

A Irshad, SA Chaudhry, Q Xie, X Li, MS Farash… - Arabian Journal for …, 2018 - Springer
In the multi-server authentication (MSA) paradigm, a subscriber might avail multiple services
of different service providers, after registering from registration authority. In this approach …

MADPTM: Mix zones and dynamic pseudonym trust management system for location privacy

I Memon, HT Mirza - International Journal of Communication …, 2018 - Wiley Online Library
In intelligent transportation systems, the messages transmitted and received from one
vehicle to another vehicle may enhance location privacy scheme; falsification message …

A secure and efficient TMIS-based authentication scheme improved against Zhang et al.'s scheme

BA Alzahrani, A Irshad - Arabian Journal for Science and Engineering, 2018 - Springer
The telecare medicine information systems (TMIS) architecture is exceedingly paving the
ways for convenient dispensing of patient-oriented healthcare services at remote distances …

A key agreement authentication protocol using an improved parallel pollard rho for electronic payment system

OR Vincent, OM Lawal - The Journal of Supercomputing, 2018 - Springer
An improved protocol with a key agreement authentication using parallel Pollard rho
algorithm for electronic payment system is proposed in this paper. The protocol employs a …

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.

A Irshad, M Sher, BA Alzahrani, A Albeshri… - KSII Transactions on …, 2018 - koreascience.kr
The increasing number of subscribers and demand of multiplicity of services has turned
Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm …

[PDF][PDF] Elliptic Curve Cryptography Using Chaotic Neural Network

A Sethi, A Mittal, R Tiwari, D Singh - International Journal of Pure and …, 2018 - academia.edu
Cryptography is the science of hiding important information while transmiting over an
insecure channel mak-ing it impossible for any adversary to read. Cryptography is very …

Self-Similar key generation for secure communication in multimedia applications

S Santhi, PD Sheba Kezia Malarchelvi - Multimedia Tools and …, 2018 - Springer
Long term research activities focus on the provision of fundamental understanding and easy
deployment of multimedia services on the multimedia communication. The rapid growth of …

[PDF][PDF] Accelerating Digital Forensics through Parallel Computing.

GF El-Kabbany, M Rasslan, HK Aslan - J. Comput. Sci., 2018 - academia.edu
Digital crimes in the era of big data and cloud computing imposes significant challenges in
digital forensics. Cloud environment provides low cost, easy management and reasonable …