Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks

VO Nyangaresi - Ad Hoc Networks, 2023 - Elsevier
Wireless body area networks have gained popularity due to their ability to enhance
efficiency, flexibility, convenience and the quality of life. In this environment, the patient …

A secure three-factor authentication protocol for e-governance system based on multiserver environments

Y Cho, J Oh, D Kwon, S Son, S Yu, Y Park… - IEEE Access, 2022 - ieeexplore.ieee.org
In electronic governance (e-governance) system, citizens can access government services
such as transportation, licensing and immigration remotely over the Internet. With the …

Privacy and data protection in mobile cloud computing: A systematic mapping study

HM Alnajrani, AA Norman, BH Ahmed - Plos one, 2020 - journals.plos.org
As a result of a shift in the world of technology, the combination of ubiquitous mobile
networks and cloud computing produced the mobile cloud computing (MCC) domain. As a …

A novel three-factor authentication protocol for multiple service providers in 6G-aided intelligent healthcare systems

TV Le, CF Lu, CL Hsu, TK Do, YF Chou, WC Wei - IEEE Access, 2022 - ieeexplore.ieee.org
6G technology is now attracting many scientific researchers due to its prominent features
including high mobility, high data rate, high operating frequency, and ultra-low end-to-end …

Three-factor UCSSO scheme with fast authentication and privacy protection for telecare medicine information systems

CL Hsu, TV Le, MC Hsieh, KY Tsai, CF Lu… - IEEE Access, 2020 - ieeexplore.ieee.org
Electronic healthcare (e-health) has gained more and more research attention in recent
years, due to its flexibility and convenience. E-health is efficiently enabled by telecare …

Content addressable memory (CAM) based robust anonymous authentication and integrity preservation scheme for wireless body area networks (WBAN)

AS Rajasekaran, M Azees, CS Dash… - Multimedia Tools and …, 2024 - Springer
Health plays a foremost role for every individual. To preserve the health, continuous
monitoring of health is essential. Wireless Body Area Network (WBAN) is a type of wireless …

Blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment

M Vivekanandan, S VN, SR U - Peer-to-Peer Networking and Applications, 2021 - Springer
The development in cloud computing platforms has resulted, hosting many day-to-day
service applications in the cloud. To avail the services provided by different cloud service …

An anonymous key distribution scheme for group healthcare services in 5G-enabled multi-server environments

TV Le, CL Hsu - IEEE access, 2021 - ieeexplore.ieee.org
Fifth generation (5G) mobile technology enables a new kind of network that provides high
peak data rates, ultra-low latency communication and high user density. Electronic …

Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks

I Khan, A Ghani, SM Saqlain, MU Ashraf… - IEEE …, 2023 - ieeexplore.ieee.org
The recent advancements in cyber technology have facilitated the global electronic sharing
of healthcare data among various healthcare professionals, including clinicians …

Empirical studies of TESLA protocol: Properties, implementations, and replacement of public cryptography using biometric authentication

K Eledlebi, CY Yeun, E Damiani, Y Al-Hammadi - IEEE Access, 2022 - ieeexplore.ieee.org
This study discusses the general overview of Timed Efficient Stream Loss-tolerant
Authentication (TESLA) protocol, including its properties, key setups, and improvement …