[HTML][HTML] Federated learning for secure IoMT-applications in smart healthcare systems: A comprehensive review

S Rani, A Kataria, S Kumar, P Tiwari - Knowledge-based systems, 2023 - Elsevier
Recent developments in the Internet of Things (IoT) and various communication
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …

Authentication protocols in internet of vehicles: Taxonomy, analysis, and challenges

P Bagga, AK Das, M Wazid, JJPC Rodrigues… - Ieee …, 2020 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is treated as an extension of Vehicle-to-Vehicle (V2V)
communication network. IoV helps in enhancing driving aids with the help of vehicle Artificial …

Smart contract-based blockchain-envisioned authentication scheme for smart farming

A Vangala, AK Sutrala, AK Das… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
A blockchain-based smart farming technology provides the agricultural data to the farmers
and other users associated with smart farming on a single integrated platform. Moreover …

Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment

B Bera, D Chattaraj, AK Das - Computer Communications, 2020 - Elsevier
In recent years, the Internet of Drones (IoD) has emerged as an important research topic in
the academy and industry because it has several potential applications ranging from the …

Blockchain-envisioned secure data delivery and collection scheme for 5g-based iot-enabled internet of drones environment

B Bera, S Saha, AK Das, N Kumar… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
The Internet of Drones (IoD) is widely used in a wide range of applications from military to
civilian applications from the past years. However, during communication either with the …

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

J Shen, Z Gui, S Ji, J Shen, H Tan, Y Tang - Journal of Network and …, 2018 - Elsevier
With the development of cloud computing and wireless body area networks (WBANs),
wearable equipments are able to become new intelligent terminals to provide services for …

[图书][B] Understanding cryptography

C Paar, J Pelzl - 2010 - Springer
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …

Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things

P Hu, H Ning, T Qiu, H Song, Y Wang… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
Face identification and resolution technology is crucial to ensure the identity consistency of
humans in physical space and cyber space. In the current Internet of Things (IoT) and big …

[图书][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems

X Li, J Peng, MS Obaidat, F Wu, MK Khan… - IEEE Systems …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) enables all objects to connect to the Internet and exchange data
via different emerging technologies, which makes the intelligent identification and …