Privacy-preserving secure and low-cost medical data communication scheme for smart healthcare

M Soni, DK Singh - Computer Communications, 2022 - Elsevier
Wireless body area network (WBAN) remotely offers various medical services for the
benefits of patients, doctors, and society in which medical data is transferred between …

An identity-based authentication protocol for the telecare medical information system (TMIS) using a physically unclonable function

S Shamshad, MF Ayub, K Mahmood… - IEEE Systems …, 2021 - ieeexplore.ieee.org
Telecare Medical Information System (TMIS) encourages patients to securely exchange their
health data with a remote medical server for real-time remote diagnosis. During the remote …

A group key-based lightweight Mutual Authentication and Key Agreement (MAKA) protocol for multi-server environment

PK Roy, A Bhattacharya - The Journal of Supercomputing, 2022 - Springer
Abstract Use of Internet-of-Things (IoT)-based wireless applications has been exponentially
increased nowadays and likely to accelerate in near future. Thus, a large volume of traffic …

A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC

RY Patil, A Karati, YH Patil - International Journal of Information …, 2024 - Springer
Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector
has evolved significantly in recent years. However, security breaches reveal incorrect …

A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture

S Shukla, SJ Patel - Cluster Computing, 2024 - Springer
The emerging cloud infrastructure has escalated number of servers offering flexible and
diverse remote services through public channels. However, user authentication in …

Advances in secure knowledge management in the artificial intelligence era

SK Sahay, N Goel, M Jadliwala… - Information Systems …, 2021 - Springer
Knowledge management and preservation started thousands of years ago from cave
paintings, representing words by pictures, later moving to books through the invention of …

A mining town in a digital land: browser-based cryptocurrency mining as an alternative to online advertising

A Yayla, E Dincelli, S Parameswaran - Information Systems Frontiers, 2024 - Springer
Advertising has been the most common strategy for content monetization. However,
behavioral data collection for personalized advertisements has raised privacy concerns …

Cost-effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT)

K Mahmood, MS Obaidat, S Shamshad… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is a network of interconnected objects, which congregate and
exchange gigantic amounts of data. Usually, pre-deployed embedded sensors sense this …

A provably secure multi-server authentication scheme based on Chebyshev chaotic map

R Chen, Y Mou, W Li - Journal of Information Security and Applications, 2024 - Elsevier
The Internet provides us a lot of online services. Under the conventional single-server
architectures, remote users must register separately on each visited server to obtain the …

Lightweight two-factor authentication framework with privacy preserving for smart eHealth

PM Rao, BD Deebak - Peer-to-Peer Networking and Applications, 2024 - Springer
Abstract Unattended Wireless Sensor Networks (U-WSNs) use a non-stationary objects so-
called sink node (SN) or mobile sink (MS) to perform a few data computation processes …