A new one time password mechanism for client-server applications

V Shukla, A Chaturvedi, N Srivastava - Journal of discrete …, 2019 - Taylor & Francis
Abstract OTP (One Time Passwords) are very important in today's scenario in various
applications like in financial transactions, e-commerce etc. They are used for enhancing the …

Security and privacy issues of electronic healthcare system: a survey

A Singh, K Chatterjee - Journal of Information and Optimization …, 2019 - Taylor & Francis
In today's digital environment, the paper-based healthcare system shifts towards the
Electronic Healthcare System (EHS). The EHS features will allow its user to access the …

Machine learning based MAC protocol design for pipeline leakage detection in smart city project

G Sakya, C Dalela, L Singh, A Jain - Journal of Discrete …, 2021 - Taylor & Francis
The integration of WSN with IoT is growing exponentially for implementing real time
applications in today's world. Also an Intelligent WSN design is required for implementing …

MultiStage Authentication to Enhance Security of Virtual Machines in Cloud Environment

HM Anitha, P Jayarekha - International Journal of Advanced …, 2021 - search.proquest.com
The adoption of cloud computing in different areas has shown benefits and given solutions
to applications. The cloud provider offers virtualized platforms through virtual machines for …

Multi-Factor Biometrics for Enhanced User Authentication in an E-Health System, Ghana

L Kwao, R Millham, D Oppong… - … International Journal of …, 2020 - papers.ssrn.com
For most existing computer systems, once the user's identity is verified at login, the system
resources are available to that user until he/she exits the system. In high-risk environments …

An improved (T-DelPHI) for efficient and secure routing in MANETs

N Singh, A Singh - International Journal of Information Systems & …, 2019 - papers.ssrn.com
In this paper a novel protocol T-DelPHI has been designed with reference to paper. A
wormhole attack is one of the harmful attacks in ad hoc network within routing of packets …

[PDF][PDF] Comprehensive analysis of continuous authentication for mobile devices

A Dagar, K Singh, T Khan - researchgate.net
Continuous mobile authentication is an imperative aspect of ensuring the security and
privacy of data in the contemporary mobile computing landscape. With the proliferation of …