Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks
VO Nyangaresi - Ad Hoc Networks, 2023 - Elsevier
Wireless body area networks have gained popularity due to their ability to enhance
efficiency, flexibility, convenience and the quality of life. In this environment, the patient …
efficiency, flexibility, convenience and the quality of life. In this environment, the patient …
A secure three-factor authentication protocol for e-governance system based on multiserver environments
In electronic governance (e-governance) system, citizens can access government services
such as transportation, licensing and immigration remotely over the Internet. With the …
such as transportation, licensing and immigration remotely over the Internet. With the …
Privacy and data protection in mobile cloud computing: A systematic mapping study
As a result of a shift in the world of technology, the combination of ubiquitous mobile
networks and cloud computing produced the mobile cloud computing (MCC) domain. As a …
networks and cloud computing produced the mobile cloud computing (MCC) domain. As a …
A novel three-factor authentication protocol for multiple service providers in 6G-aided intelligent healthcare systems
TV Le, CF Lu, CL Hsu, TK Do, YF Chou, WC Wei - IEEE Access, 2022 - ieeexplore.ieee.org
6G technology is now attracting many scientific researchers due to its prominent features
including high mobility, high data rate, high operating frequency, and ultra-low end-to-end …
including high mobility, high data rate, high operating frequency, and ultra-low end-to-end …
Three-factor UCSSO scheme with fast authentication and privacy protection for telecare medicine information systems
CL Hsu, TV Le, MC Hsieh, KY Tsai, CF Lu… - IEEE Access, 2020 - ieeexplore.ieee.org
Electronic healthcare (e-health) has gained more and more research attention in recent
years, due to its flexibility and convenience. E-health is efficiently enabled by telecare …
years, due to its flexibility and convenience. E-health is efficiently enabled by telecare …
Content addressable memory (CAM) based robust anonymous authentication and integrity preservation scheme for wireless body area networks (WBAN)
Health plays a foremost role for every individual. To preserve the health, continuous
monitoring of health is essential. Wireless Body Area Network (WBAN) is a type of wireless …
monitoring of health is essential. Wireless Body Area Network (WBAN) is a type of wireless …
Blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment
M Vivekanandan, S VN, SR U - Peer-to-Peer Networking and Applications, 2021 - Springer
The development in cloud computing platforms has resulted, hosting many day-to-day
service applications in the cloud. To avail the services provided by different cloud service …
service applications in the cloud. To avail the services provided by different cloud service …
An anonymous key distribution scheme for group healthcare services in 5G-enabled multi-server environments
TV Le, CL Hsu - IEEE access, 2021 - ieeexplore.ieee.org
Fifth generation (5G) mobile technology enables a new kind of network that provides high
peak data rates, ultra-low latency communication and high user density. Electronic …
peak data rates, ultra-low latency communication and high user density. Electronic …
Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks
The recent advancements in cyber technology have facilitated the global electronic sharing
of healthcare data among various healthcare professionals, including clinicians …
of healthcare data among various healthcare professionals, including clinicians …
Empirical studies of TESLA protocol: Properties, implementations, and replacement of public cryptography using biometric authentication
This study discusses the general overview of Timed Efficient Stream Loss-tolerant
Authentication (TESLA) protocol, including its properties, key setups, and improvement …
Authentication (TESLA) protocol, including its properties, key setups, and improvement …