A provably lightweight mutually authentication and key establishment protocol using extended chaotic map for telecare medicine information system
A Kamble, V Gaikwad, J Tembhurne - International Journal of Information …, 2023 - Springer
Abstract Telecare Medicine Information System (TMIS) provides patient's efficient and
convenient e-healthcare services where the patient private health related information is …
convenient e-healthcare services where the patient private health related information is …
Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function
Telecare medicine information system (TMIS) is recognized as an important tool for
improving the quality and protection of healthcare services. In addition to protecting the …
improving the quality and protection of healthcare services. In addition to protecting the …
OOS-SSS: An efficient online/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network
Wireless sensor network (WSN) is a network system that involves spatially distributed
devices such as wireless sensor nodes. As the data collected by the sensor nodes and …
devices such as wireless sensor nodes. As the data collected by the sensor nodes and …
A provably secure lightweight subtree-based short signature scheme with fuzzy user data sharing for human-centered IoT
C Meshram, A Alsanad, JV Tembhurne… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is made up of various smart devices for the exchange of sensed data
through online services. Direct contact with people through smart devices to define …
through online services. Direct contact with people through smart devices to define …
An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
The advancement of the cloud storage technology opens up a wide range of possibilities for
adaptable data sharing. When sharing data to an extensive number of users with fuzzy …
adaptable data sharing. When sharing data to an extensive number of users with fuzzy …
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
Recently, the chaos theory has been dealt with as a decent approach to reducing the
computational complexity of a cryptographic technique while fulfilling the security …
computational complexity of a cryptographic technique while fulfilling the security …
A subtree‐based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing
Cloud computing technologies have been prospering in recent years and have opened an
avenue for a wide variety of forms of adaptable data sharing. Taking advantage of these …
avenue for a wide variety of forms of adaptable data sharing. Taking advantage of these …
[PDF][PDF] SBOOSP for Massive Devices in 5G WSNs Using Conformable Chaotic Maps.
The commercialization of the fifth-generation (5G) wireless network has begun. Massive
devices are being integrated into 5G-enabled wireless sensor networks (5G WSNs) to …
devices are being integrated into 5G-enabled wireless sensor networks (5G WSNs) to …
An efficient, robust, and lightweight subtree-based three-factor authentication procedure for large-scale DWSN in random oracle
Wireless sensor networks (WSNs) are the backbones of numerous real-time monitoring
systems that are applied to serve many different parts of our everyday lives including traffic …
systems that are applied to serve many different parts of our everyday lives including traffic …
Chebyshev chaotic map‐based ID‐based cryptographic model using subtree and fuzzy‐entity data sharing for public key cryptography
C Meshram, MS Obaidat, SG Meshram - Security and Privacy, 2018 - Wiley Online Library
Recently, chaos has been dealt with as a decent approach to reduce computational
complexity while fulfilling security necessities of a cryptographic technique. Cloud storage …
complexity while fulfilling security necessities of a cryptographic technique. Cloud storage …