RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing

V Kumar, M Ahmad, D Mishra, S Kumari… - Vehicular …, 2020 - Elsevier
Vehicular cloud computing (VCC) is an emerging research area, which comprises cloud,
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …

Csef: cloud-based secure and efficient framework for smart medical system using ecc

A Kumari, V Kumar, MY Abbasi, S Kumari… - IEEE …, 2020 - ieeexplore.ieee.org
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …

An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system

K Ma, G Song, Y Zhou, R Xu, B Yang - Computer Standards & Interfaces, 2024 - Elsevier
In recent years, due to the spread of infectious diseases such as COVID-19, people begin to
use the electronic medical system to obtain remote diagnosis and treatment services, which …

[HTML][HTML] An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach

AA Khan, V Kumar, M Ahmad - Journal of King Saud University-Computer …, 2022 - Elsevier
Smart grid (SG) provides a suitable adjustment in the amount of power generation by
providing the ability to supervise consumer behavior. SG uses in the smart system to …

[PDF][PDF] RAVCC: robust authentication protocol for RFID based vehicular cloud computing

V Kumar, R Kumar, V Kumar, A Kumari, S Kumari - J. Netw. Intell, 2022 - bit.nkust.edu.tw
Vehicular cloud computing (VCC) stands for vehicle cloud computing, which combines
cloud, vehicular networking, and Internet of Things (IoT) and related technologies. VCC is …

A secure user authentication protocol using elliptic curve cryptography

A Kumari, M Yahya Abbasi, V Kumar… - Journal of Discrete …, 2019 - Taylor & Francis
Authentication is a significant security prerequisite for secure communications. However,
most of identity assisted mutual authentication protocols are requiring of security verification …

Cloud-based authenticated protocol for healthcare monitoring system

P Chandrakar, S Sinha, R Ali - Journal of Ambient Intelligence and …, 2020 - Springer
In this paper, we have developed cloud-based authentication protocol for e-health care
monitoring system which provides a secure platform to the patients. By using this system, the …

Two‐factor authentication using biometric based quantum operations

MK Sharma, MJ Nene - Security and Privacy, 2020 - Wiley Online Library
Two‐way authentication methods are utilized in every online user authentication
transactions. Use of one time passwords (OTP) have proved to be more secure method, than …

A taxonomy of multimedia-based graphical user authentication for green Internet of Things

KA Awan, I Ud Din, A Almogren, N Kumar… - ACM Transactions on …, 2021 - dl.acm.org
Authentication receives enormous consideration from the research community and is proven
to be an interesting field in today's era. User authentication is the major concern because …

Dual factor third‐party biometric‐based authentication scheme using quantum one time passwords

MK Sharma, MJ Nene - Security and Privacy, 2020 - Wiley Online Library
Abstract One Time Passwords (OTP) are being widely used for authentication of user to
access a number of services offered online. The security vulnerabilities in classical …