A secure three-factor authentication scheme for IoT environments
Today, many users' extensive use of the Internet of Things (IoT) has made authentication an
inevitable issue in the IoT. The currently existing authentication methods are subjected to …
inevitable issue in the IoT. The currently existing authentication methods are subjected to …
[HTML][HTML] A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment
U Narayanan, V Paul, S Joseph - … of King Saud University-Computer and …, 2022 - Elsevier
With the rapid growth of data sources, Big data security in Cloud is a big challenge. Different
issues have ascended in the area of Big data security such as infrastructure security, data …
issues have ascended in the area of Big data security such as infrastructure security, data …
A provably secure authentication and key exchange protocol in vehicular ad hoc networks
While cloud computing and Internet of Things (IoT) technologies have gradually matured,
mobile intelligent transportation systems have begun to be widely used. In particular, the …
mobile intelligent transportation systems have begun to be widely used. In particular, the …
A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme
Smart card-based remote authentication schemes are widely used in multi-medical-server-
based telecare medicine information systems (TMISs). Biometric is one of the most …
based telecare medicine information systems (TMISs). Biometric is one of the most …
A biometric based remote user authentication technique using smart card in multi-server environment
Remote user authentication is an efficient technique to perform secure communication over
an insecure network. In this current research article, a lightweight remote user authentication …
an insecure network. In this current research article, a lightweight remote user authentication …
Secure and efficient user authentication scheme based on password and smart card for multiserver environment
Y Zhao, S Li, L Jiang - Security and Communication Networks, 2018 - Wiley Online Library
The rapid development of information and network technologies motivates the emergence of
various new computing paradigms, such as distributed computing, cloud computing, and …
various new computing paradigms, such as distributed computing, cloud computing, and …
Elliptic curve signcryption-based mutual authentication protocol for smart cards
In the modern computing environment, smart cards are being used extensively, which are
intended to authenticate a user with the system or server. Owing to the constrictions of …
intended to authenticate a user with the system or server. Owing to the constrictions of …
A novel multiserver authentication scheme using proxy resignature with scalability and strong user anonymity
As the indispensable part of the security demand in a distributed system, a variety of online
services need to be protected from unauthorized access. Multiserver authentication (MA) is …
services need to be protected from unauthorized access. Multiserver authentication (MA) is …
Lightweight privacy‐aware secure authentication scheme for cyber‐physical systems in the edge intelligence era
D Bakkiam Deebak… - … and Computation: Practice …, 2023 - Wiley Online Library
Abstract Internet of Things (IoT) and cyber‐physical systems demand proper real‐time data
processing and analysis to fulfill the essential characteristics of seamless computing …
processing and analysis to fulfill the essential characteristics of seamless computing …
Security Enhancement of biometric-based authentication systems using smart card
H Kim - IEEE Access, 2024 - ieeexplore.ieee.org
Remote authentication has been extensively studied over the past few decades, with
password-based authentication being a common approach since Lamport's 1981 proposal …
password-based authentication being a common approach since Lamport's 1981 proposal …