RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
Vehicular cloud computing (VCC) is an emerging research area, which comprises cloud,
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …
Csef: cloud-based secure and efficient framework for smart medical system using ecc
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …
manner. There are various technologies used in smart architecture such as cloud …
An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system
K Ma, G Song, Y Zhou, R Xu, B Yang - Computer Standards & Interfaces, 2024 - Elsevier
In recent years, due to the spread of infectious diseases such as COVID-19, people begin to
use the electronic medical system to obtain remote diagnosis and treatment services, which …
use the electronic medical system to obtain remote diagnosis and treatment services, which …
[HTML][HTML] An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
Smart grid (SG) provides a suitable adjustment in the amount of power generation by
providing the ability to supervise consumer behavior. SG uses in the smart system to …
providing the ability to supervise consumer behavior. SG uses in the smart system to …
[PDF][PDF] RAVCC: robust authentication protocol for RFID based vehicular cloud computing
Vehicular cloud computing (VCC) stands for vehicle cloud computing, which combines
cloud, vehicular networking, and Internet of Things (IoT) and related technologies. VCC is …
cloud, vehicular networking, and Internet of Things (IoT) and related technologies. VCC is …
A secure user authentication protocol using elliptic curve cryptography
Authentication is a significant security prerequisite for secure communications. However,
most of identity assisted mutual authentication protocols are requiring of security verification …
most of identity assisted mutual authentication protocols are requiring of security verification …
Cloud-based authenticated protocol for healthcare monitoring system
P Chandrakar, S Sinha, R Ali - Journal of Ambient Intelligence and …, 2020 - Springer
In this paper, we have developed cloud-based authentication protocol for e-health care
monitoring system which provides a secure platform to the patients. By using this system, the …
monitoring system which provides a secure platform to the patients. By using this system, the …
Two‐factor authentication using biometric based quantum operations
MK Sharma, MJ Nene - Security and Privacy, 2020 - Wiley Online Library
Two‐way authentication methods are utilized in every online user authentication
transactions. Use of one time passwords (OTP) have proved to be more secure method, than …
transactions. Use of one time passwords (OTP) have proved to be more secure method, than …
A taxonomy of multimedia-based graphical user authentication for green Internet of Things
Authentication receives enormous consideration from the research community and is proven
to be an interesting field in today's era. User authentication is the major concern because …
to be an interesting field in today's era. User authentication is the major concern because …
Dual factor third‐party biometric‐based authentication scheme using quantum one time passwords†
MK Sharma, MJ Nene - Security and Privacy, 2020 - Wiley Online Library
Abstract One Time Passwords (OTP) are being widely used for authentication of user to
access a number of services offered online. The security vulnerabilities in classical …
access a number of services offered online. The security vulnerabilities in classical …