A provably lightweight mutually authentication and key establishment protocol using extended chaotic map for telecare medicine information system

A Kamble, V Gaikwad, J Tembhurne - International Journal of Information …, 2023 - Springer
Abstract Telecare Medicine Information System (TMIS) provides patient's efficient and
convenient e-healthcare services where the patient private health related information is …

Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function

VP Gaikwad, JV Tembhurne, C Meshram… - The Journal of …, 2021 - Springer
Telecare medicine information system (TMIS) is recognized as an important tool for
improving the quality and protection of healthcare services. In addition to protecting the …

OOS-SSS: An efficient online/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network

C Meshram, CC Lee, SG Meshram, A Meshram - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless sensor network (WSN) is a network system that involves spatially distributed
devices such as wireless sensor nodes. As the data collected by the sensor nodes and …

A provably secure lightweight subtree-based short signature scheme with fuzzy user data sharing for human-centered IoT

C Meshram, A Alsanad, JV Tembhurne… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is made up of various smart devices for the exchange of sensed data
through online services. Direct contact with people through smart devices to define …

An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment

C Meshram, CC Lee, SG Meshram, MK Khan - Soft computing, 2019 - Springer
The advancement of the cloud storage technology opens up a wide range of possibilities for
adaptable data sharing. When sharing data to an extensive number of users with fuzzy …

An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem

C Meshram, CC Lee, SG Meshram, CT Li - Soft Computing, 2019 - Springer
Recently, the chaos theory has been dealt with as a decent approach to reducing the
computational complexity of a cryptographic technique while fulfilling the security …

A subtree‐based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing

C Meshram, CC Lee, AS Ranadive… - International Journal …, 2020 - Wiley Online Library
Cloud computing technologies have been prospering in recent years and have opened an
avenue for a wide variety of forms of adaptable data sharing. Taking advantage of these …

[PDF][PDF] SBOOSP for Massive Devices in 5G WSNs Using Conformable Chaotic Maps.

C Meshram, AL Imoize, SS Jamal… - … , Materials & Continua, 2022 - researchgate.net
The commercialization of the fifth-generation (5G) wireless network has begun. Massive
devices are being integrated into 5G-enabled wireless sensor networks (5G WSNs) to …

An efficient, robust, and lightweight subtree-based three-factor authentication procedure for large-scale DWSN in random oracle

C Meshram, MS Obaidat, CC Lee… - IEEE Systems …, 2021 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are the backbones of numerous real-time monitoring
systems that are applied to serve many different parts of our everyday lives including traffic …

Chebyshev chaotic map‐based ID‐based cryptographic model using subtree and fuzzy‐entity data sharing for public key cryptography

C Meshram, MS Obaidat, SG Meshram - Security and Privacy, 2018 - Wiley Online Library
Recently, chaos has been dealt with as a decent approach to reduce computational
complexity while fulfilling security necessities of a cryptographic technique. Cloud storage …