Privacy-preserving secure and low-cost medical data communication scheme for smart healthcare
M Soni, DK Singh - Computer Communications, 2022 - Elsevier
Wireless body area network (WBAN) remotely offers various medical services for the
benefits of patients, doctors, and society in which medical data is transferred between …
benefits of patients, doctors, and society in which medical data is transferred between …
An identity-based authentication protocol for the telecare medical information system (TMIS) using a physically unclonable function
Telecare Medical Information System (TMIS) encourages patients to securely exchange their
health data with a remote medical server for real-time remote diagnosis. During the remote …
health data with a remote medical server for real-time remote diagnosis. During the remote …
A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment
PK Roy, A Bhattacharya - The Journal of Supercomputing, 2022 - Springer
Abstract Use of Internet-of-Things (IoT)-based wireless applications has been exponentially
increased nowadays and likely to accelerate in near future. Thus, a large volume of traffic …
increased nowadays and likely to accelerate in near future. Thus, a large volume of traffic …
A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC
Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector
has evolved significantly in recent years. However, security breaches reveal incorrect …
has evolved significantly in recent years. However, security breaches reveal incorrect …
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture
The emerging cloud infrastructure has escalated number of servers offering flexible and
diverse remote services through public channels. However, user authentication in …
diverse remote services through public channels. However, user authentication in …
Advances in secure knowledge management in the artificial intelligence era
SK Sahay, N Goel, M Jadliwala… - Information Systems …, 2021 - Springer
Knowledge management and preservation started thousands of years ago from cave
paintings, representing words by pictures, later moving to books through the invention of …
paintings, representing words by pictures, later moving to books through the invention of …
A mining town in a digital land: browser-based cryptocurrency mining as an alternative to online advertising
Advertising has been the most common strategy for content monetization. However,
behavioral data collection for personalized advertisements has raised privacy concerns …
behavioral data collection for personalized advertisements has raised privacy concerns …
Cost-effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT)
The Internet of Things (IoT) is a network of interconnected objects, which congregate and
exchange gigantic amounts of data. Usually, pre-deployed embedded sensors sense this …
exchange gigantic amounts of data. Usually, pre-deployed embedded sensors sense this …
A provably secure multi-server authentication scheme based on Chebyshev chaotic map
R Chen, Y Mou, W Li - Journal of Information Security and Applications, 2024 - Elsevier
The Internet provides us a lot of online services. Under the conventional single-server
architectures, remote users must register separately on each visited server to obtain the …
architectures, remote users must register separately on each visited server to obtain the …
Lightweight two-factor authentication framework with privacy preserving for smart eHealth
PM Rao, BD Deebak - Peer-to-Peer Networking and Applications, 2024 - Springer
Abstract Unattended Wireless Sensor Networks (U-WSNs) use a non-stationary objects so-
called sink node (SN) or mobile sink (MS) to perform a few data computation processes …
called sink node (SN) or mobile sink (MS) to perform a few data computation processes …