[HTML][HTML] Care4U: Integrated healthcare systems based on blockchain
R Kamal, EED Hemdan, N El-Fishway - Blockchain: Research and …, 2023 - Elsevier
During the COVID-19 crisis, the need to stay at home has increased dramatically. In
addition, the number of sick people, especially elderly persons, has increased exponentially …
addition, the number of sick people, especially elderly persons, has increased exponentially …
LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems
Fog computing is a new computing model with limited resources located near the Internet of
Things (IoT) devices to provide low transmission delay, mobility, and location awareness …
Things (IoT) devices to provide low transmission delay, mobility, and location awareness …
TAKM-FC: Two-way Authentication with efficient Key Management in Fog Computing Environments
A mechanism of fog computing environment is employed in order to enhance the cloud
computing services toward the edge devices in a range of locations with low latency. A fog …
computing services toward the edge devices in a range of locations with low latency. A fog …
Efficient ECC-based authentication scheme for fog-based IoT environment
MA Shaaban, AS Alsharkawy, MT AbouKreisha… - arXiv preprint arXiv …, 2024 - arxiv.org
The rapid growth of cloud computing and Internet of Things (IoT) applications faces several
threats, such as latency, security, network failure, and performance. These issues are solved …
threats, such as latency, security, network failure, and performance. These issues are solved …
[HTML][HTML] Fog computing effective load balancing and strategy for deadlock prediction management
The reliability, real-time performance, and quality of service of fog computing are
dramatically affected by deadlock. In this paper, a new Deadlock Management System for a …
dramatically affected by deadlock. In this paper, a new Deadlock Management System for a …
A sustainable mutual authentication protocol for IoT-Fog-Cloud environment
SP Satpathy, S Mohanty, M Pradhan - Peer-to-Peer Networking and …, 2025 - Springer
This paper introduces a mutual authentication protocol designed for the IoT-Fog-Cloud
environment, utilizing Elliptic Curve Cryptography (ECC). The proposed protocol supports …
environment, utilizing Elliptic Curve Cryptography (ECC). The proposed protocol supports …
Design of an efficient and secure authentication scheme for cloud-fog-device framework using key agreement and management
IoT and Smart devices are typically deployed for real-time applications that need to
communicate to the cloud infrastructure for data processing and storage. However, the cloud …
communicate to the cloud infrastructure for data processing and storage. However, the cloud …
AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments
FM Salem, M Safwat, R Fathy, S Habashy - Journal of Cloud Computing, 2023 - Springer
The rapid growth of Internet users was the motivation of the emerge appearance of new
computing models such as cloud computing, fog computing and edge computing. For this …
computing models such as cloud computing, fog computing and edge computing. For this …
A comprehensive survey on cloud security mechanisms
Cloud computing indicates a tremendous promise for providing on-demand solutions to
customers with increased flexibility even at a lower cost over the internet. Cloud service …
customers with increased flexibility even at a lower cost over the internet. Cloud service …
Secure Mutual Authentication Scheme in Fog Computing: Survey
SR Homadi, OA Dawood - 2023 Al-Sadiq International …, 2023 - ieeexplore.ieee.org
As fog computing becomes more widespread, security issues become increasingly critical.
Mutual authentication between fog nodes and end-users is a crucial part of fog computing …
Mutual authentication between fog nodes and end-users is a crucial part of fog computing …