RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing

V Kumar, M Ahmad, D Mishra, S Kumari… - Vehicular …, 2020 - Elsevier
Vehicular cloud computing (VCC) is an emerging research area, which comprises cloud,
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …

Csef: cloud-based secure and efficient framework for smart medical system using ecc

A Kumari, V Kumar, MY Abbasi, S Kumari… - IEEE …, 2020 - ieeexplore.ieee.org
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …

ESEAP: ECC based secure and efficient mutual authentication protocol using smart card

A Kumari, S Jangirala, MY Abbasi, V Kumar… - Journal of Information …, 2020 - Elsevier
Smart card based user server mutual authentication framework is famous for safe
communication via unfavorable and insecure communication system. The authenticated …

An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing

W Akram, K Mahmood, X Li, M Sadiq, Z Lv… - Computer Networks, 2022 - Elsevier
Abstract Vehicular Cloud Computing (VCC) is a contemporary paradigm that includes the
Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers …

An efficient mutual authentication framework for healthcare system in cloud computing

V Kumar, S Jangirala, M Ahmad - Journal of medical systems, 2018 - Springer
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility
for patients to explore medical treatment, accumulate and approach medical data through …

SEBAP: a secure and efficient biometric‐assisted authentication protocol using ECC for vehicular cloud computing

V Kumar, M Ahmad, A Kumari… - International Journal …, 2021 - Wiley Online Library
Vehicular cloud computing (VCC) is an emerging research area of cloud and vehicular
networking. It equips vehicles with networking and sensing capacities for vehicle‐to‐vehicle …

[PDF][PDF] Security issues and future challenges of cloud service authentication

SY Lim, MLM Kiah, TF Ang - Acta Polytechnica Hungarica, 2017 - acta.uni-obuda.hu
Authentication, in the cloud context, is the process of validating and guaranteeing the
identity of cloud service subscribers or users. It is deemed essential since its strength directly …

An effective non-commutative encryption approach with optimized genetic algorithm for ensuring data protection in cloud computing

SJ Nirmal Kumar, S Ravimaran… - Computer Modeling in …, 2020 - ingentaconnect.com
Nowadays, succeeding safe communication and protection-sensitive data from
unauthorized access above public networks are the main worries in cloud servers. Hence, to …

A secure user authentication protocol using elliptic curve cryptography

A Kumari, M Yahya Abbasi, V Kumar… - Journal of Discrete …, 2019 - Taylor & Francis
Authentication is a significant security prerequisite for secure communications. However,
most of identity assisted mutual authentication protocols are requiring of security verification …

Two‐factor authentication using biometric based quantum operations

MK Sharma, MJ Nene - Security and Privacy, 2020 - Wiley Online Library
Two‐way authentication methods are utilized in every online user authentication
transactions. Use of one time passwords (OTP) have proved to be more secure method, than …