RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
Vehicular cloud computing (VCC) is an emerging research area, which comprises cloud,
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …
Csef: cloud-based secure and efficient framework for smart medical system using ecc
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …
manner. There are various technologies used in smart architecture such as cloud …
ESEAP: ECC based secure and efficient mutual authentication protocol using smart card
Smart card based user server mutual authentication framework is famous for safe
communication via unfavorable and insecure communication system. The authenticated …
communication via unfavorable and insecure communication system. The authenticated …
An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
Abstract Vehicular Cloud Computing (VCC) is a contemporary paradigm that includes the
Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers …
Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers …
An efficient mutual authentication framework for healthcare system in cloud computing
V Kumar, S Jangirala, M Ahmad - Journal of medical systems, 2018 - Springer
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility
for patients to explore medical treatment, accumulate and approach medical data through …
for patients to explore medical treatment, accumulate and approach medical data through …
SEBAP: a secure and efficient biometric‐assisted authentication protocol using ECC for vehicular cloud computing
Vehicular cloud computing (VCC) is an emerging research area of cloud and vehicular
networking. It equips vehicles with networking and sensing capacities for vehicle‐to‐vehicle …
networking. It equips vehicles with networking and sensing capacities for vehicle‐to‐vehicle …
[PDF][PDF] Security issues and future challenges of cloud service authentication
Authentication, in the cloud context, is the process of validating and guaranteeing the
identity of cloud service subscribers or users. It is deemed essential since its strength directly …
identity of cloud service subscribers or users. It is deemed essential since its strength directly …
An effective non-commutative encryption approach with optimized genetic algorithm for ensuring data protection in cloud computing
SJ Nirmal Kumar, S Ravimaran… - Computer Modeling in …, 2020 - ingentaconnect.com
Nowadays, succeeding safe communication and protection-sensitive data from
unauthorized access above public networks are the main worries in cloud servers. Hence, to …
unauthorized access above public networks are the main worries in cloud servers. Hence, to …
A secure user authentication protocol using elliptic curve cryptography
Authentication is a significant security prerequisite for secure communications. However,
most of identity assisted mutual authentication protocols are requiring of security verification …
most of identity assisted mutual authentication protocols are requiring of security verification …
Two‐factor authentication using biometric based quantum operations
MK Sharma, MJ Nene - Security and Privacy, 2020 - Wiley Online Library
Two‐way authentication methods are utilized in every online user authentication
transactions. Use of one time passwords (OTP) have proved to be more secure method, than …
transactions. Use of one time passwords (OTP) have proved to be more secure method, than …