[HTML][HTML] Security and privacy in IoT-cloud-based e-health systems—A comprehensive review

C Butpheng, KH Yeh, H Xiong - Symmetry, 2020 - mdpi.com
When the Internet and other interconnected networks are used in a health system, it is
referred to as “e-Health.” In this paper, we examined research studies from 2017–2020 to …

Systematic survey of mobile payments, protocols, and security infrastructure

S Bojjagani, VN Sastry, CM Chen, S Kumari… - Journal of Ambient …, 2023 - Springer
Mobile payments makeup one of the fastest-growing mobile services available today and
are widely used by smartphones for utility payments, bill payments, and online shopping …

Hashed Needham Schroeder industrial IoT based cost optimized deep secured data transmission in cloud

JA Alzubi, R Manikandan, OA Alzubi, I Qiqieh, R Rahim… - Measurement, 2020 - Elsevier
Deep learning is an encouraging approach for extracting precise information from raw
sensor data from IoT devices. In this paper, Hashed Needham Schroeder (HNS) Cost …

Discovering IoT implications in business and management: A computational thematic analysis

MS Delgosha, N Hajiheydari, M Talafidaryani - Technovation, 2022 - Elsevier
IoT as a disruptive technology is contributing toward ground-breaking experiences in
contemporary enterprises and in our daily life. Rapidly changing business environment and …

Mscryptonet: Multi-scheme privacy-preserving deep learning in cloud computing

OA Kwabena, Z Qin, T Zhuang, Z Qin - IEEE Access, 2019 - ieeexplore.ieee.org
Privacy in the Internet of Things is a fundamental challenge for the Ubiquitous healthcare
systems that depend on the data aggregated and collaborative deep learning among …

Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments

H Xiong, Q Mei, Y Zhao - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
With the continuous development of the industrial Internet of Things (IIoT), many
organizations opt for storing the data collected by smart devices on a cloud server for saving …

A secure and authenticated mobile payment protocol against off-site attack strategy

L Fang, M Li, Z Liu, C Lin, S Ji, A Zhou… - … on Dependable and …, 2021 - ieeexplore.ieee.org
Mobile payment system has been expected to provide more efficient and convenient
payment methods. However, compared to traditional payments, mobile payment issues …

Improved secure transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments

Z Qiao, Q Yang, Y Zhou, M Zhang - IEEE Systems Journal, 2021 - ieeexplore.ieee.org
To achieve security of mobile payments within insecure public communication networks, in
2018, a secure transaction scheme for mobile payments is constructed by Yeh from a …

Applying transaction cost theory and push-pull-mooring model to investigate mobile payment switching behaviors with well-established traditional financial …

HP Lu, YS Wung - Journal of theoretical and applied electronic commerce …, 2021 - mdpi.com
The technology of mobile payments has received more attention than ever. However,
whether it is possible that mobile payment will become a common payment method for …

[HTML][HTML] Role of authentication factors in Fin-tech mobile transaction security

HU Khan, M Sohail, S Nazir, T Hussain, B Shah, F Ali - Journal of Big Data, 2023 - Springer
Fin-Tech is the merging of finance and technology, to be considered a key term for
technology-based financial operations and money transactions as far as Fin-Tech is …