[HTML][HTML] Barriers and facilitators that influence telemedicine-based, real-time, online consultation at patients' homes: systematic literature review

HKY Almathami, KT Win… - Journal of medical Internet …, 2020 - jmir.org
Background Health care providers are adopting information and communication
technologies (ICTs) to enhance their services. Telemedicine is one of the services that rely …

Design of secure user authenticated key management protocol for generic IoT networks

M Wazid, AK Das, V Odelu, N Kumar… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
In recent years, the research in generic Internet of Things (IoT) attracts a lot of practical
applications including smart home, smart city, smart grid, industrial Internet, connected …

Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment

B Bera, D Chattaraj, AK Das - Computer Communications, 2020 - Elsevier
In recent years, the Internet of Drones (IoD) has emerged as an important research topic in
the academy and industry because it has several potential applications ranging from the …

Secure remote user authenticated key establishment protocol for smart home environment

M Wazid, AK Das, V Odelu, N Kumar… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The Information and Communication Technology (ICT) has been used in wide range of
applications, such as smart living, smart health and smart transportation. Among all these …

Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Cloud centric authentication for wearable healthcare monitoring system

J Srinivas, AK Das, N Kumar… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Security and privacy are the major concerns in cloud computing as users have limited
access on the stored data at the remote locations managed by different service providers …

A secure biometrics-based multi-server authentication protocol using smart cards

V Odelu, AK Das, A Goswami - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Recently, in 2014, He and Wang proposed a robust and efficient multi-server authentication
scheme using biometrics-based smart card and elliptic curve cryptography (ECC). In this …

Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things

S Roy, S Chatterjee, AK Das… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
The recent proliferation of mobile devices, such as smartphones and wearable devices has
given rise to crowdsourcing Internet of Things (IoT) applications. E-healthcare service is one …

Design of secure and lightweight authentication protocol for wearable devices environment

AK Das, M Wazid, N Kumar, MK Khan… - IEEE journal of …, 2017 - ieeexplore.ieee.org
Wearable devices are used in various applications to collect information including step
information, sleeping cycles, workout statistics, and health-related information. Due to the …

A lightweight authentication scheme for 6G-IoT enabled maritime transport system

SA Chaudhry, A Irshad, MA Khan… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The Sixth-Generation (6G) mobile network has the potential to provide not only traditional
communication services but also additional processing, caching, sensing, and control …