[HTML][HTML] An Android-Based Internet of Medical Things Adaptive User Authentication and Authorization Model for the Elderly
Globally, 77% of the elderly aged 65 and above suffer from multiple chronic ailments,
according to recent research. However, several barriers within the healthcare system in the …
according to recent research. However, several barriers within the healthcare system in the …
Multi-factor Authentication and Data Integrity for WBAN Using Hash-Based Techniques
In recent days, a wireless body area network (WBAN) has been developed as part of the
Internet of Things (IoT) with sensors and actuators in three different modes, building its …
Internet of Things (IoT) with sensors and actuators in three different modes, building its …
Graph Attention Preemptive Traffic Aware Sparse Neural Autoencoder-Based Secured Data Transmission in Cloud Computing
S Radha, S Jeyalaksshmi - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
With the development of several services, traffic signal preemption is carried out for
emergency tasks. For performing workflow intent, cloud systems offer unlimited virtual …
emergency tasks. For performing workflow intent, cloud systems offer unlimited virtual …
Survey on Identity Authentication in Metaverse Environment.
D Miaolei, Z Haonan, MA Mimi… - Journal of Computer …, 2024 - search.ebscohost.com
The identity authentication schemes in the traditional network environment are designed
according to the characteristics of their own environments, which are difficult to meet the …
according to the characteristics of their own environments, which are difficult to meet the …
A secure authentication protocol for remote patient monitoring in an internet‐of‐medical‐things environment
Abstract Internet of Medical Things (IoMT) enable users to avail healthcare services
remotely. In IoMT, sensor nodes (SNs), like blood pressure sensors and temperature …
remotely. In IoMT, sensor nodes (SNs), like blood pressure sensors and temperature …
Design of Lightweight Authentication Scheme for Low Power Internet of Medical Things (IoMT)
A Poudel, S Mohanty, M Pradhan - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
The Internet of Medical Things plays a key role in contemporary healthcare systems by
leveraging sensor technology to monitor essential physiological parameters such as blood …
leveraging sensor technology to monitor essential physiological parameters such as blood …
Parted Security Method for Secure Data Exchange in Heterogeneous Applications Using Wireless Sensor Networks
GN Chandrika, S Ramesh, K Balasamy… - 2024 Third …, 2024 - ieeexplore.ieee.org
In tackling the changing security issues in Wireless Sensor Network (WSN) applications, the
Parted Secure Data Exchange Method (PSDEM) is a noteworthy development. In order to …
Parted Secure Data Exchange Method (PSDEM) is a noteworthy development. In order to …
An Efficient Lightweight Authentication Scheme for Smart Healthcare in IoMT Applications
A Merchant, PV Vamattathil, SJ Payattukalanirappel - 2024 - researchsquare.com
Abstract The Internet of Medical Things (IoMT), is a network made from various medical
infrastructures and sensors connected using wireless body area networks (WBANs). The …
infrastructures and sensors connected using wireless body area networks (WBANs). The …
Integrity for WBAN Using Hash-Based Techniques
In recent days, a wireless body area network (WBAN) has been developed as part of the
Internet of Things (IoT) with sensors and actuators in three different modes, building its …
Internet of Things (IoT) with sensors and actuators in three different modes, building its …
On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud
Z Cao, L Liu - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Peer-to-peer communication systems can provide many functions, including anonymized
routing of network traffic, massive parallel computing environments, and distributed storage …
routing of network traffic, massive parallel computing environments, and distributed storage …