An improved anonymous authentication scheme for distributed mobile cloud computing services

SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon - Cluster Computing, 2019 - Springer
Mobile cloud computing blend mobile and cloud computing together with the help of
wireless communication technology to achieve benefits for the stakeholders. These …

Efficient, secure, and privacy-preserving PMIPv6 protocol for V2G networks

MH Eiza, Q Shi, AK Marnerides… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
To ensure seamless communication between mobile electric vehicles (EVs) and EV power
supply equipment, support for ubiquitous and transparent mobile IP communications is …

An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data

I Khan, SA Chaudhry, M Sher, JI Khan… - The Journal of …, 2018 - Springer
Telecare medicine information systems (TMISs) provides a platform to the participating
medical entities to share medical data over an insecure public channel. Medical drop box …

An ameliorated two‐factor anonymous key exchange authentication protocol for mobile client‐server environment

K Mahmood, H Naqvi, BA Alzahrani… - International Journal …, 2018 - Wiley Online Library
Mobile communication is now an essential part of our day‐to‐day life due to expeditious
progress in the industry of information technology. Prior to session key exchange with the …

Cryptanalysis and improvement of" a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks"

M Alizadeh, M Zamani, S Baharun, A Abdul Manaf… - PloS one, 2015 - journals.plos.org
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports
mobility without mobile nodes' participation in mobility signaling. The details of user …

Security analysis and enhanced user authentication in proxy mobile IPv6 networks

D Kang, J Jung, D Lee, H Kim, D Won - PloS one, 2017 - journals.plos.org
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that
allows a Mobile Node (MN) connected to the PMIPv6 domain to move from one network to …

[PDF][PDF] Secure SMS Method Based on Social Networks

S Yazdanpanah, S Shojae Chaeikar - International Journal of …, 2016 - academia.edu
ABSTRACT Nowadays, Short Message Service (SMS) communications play important role
in daily lives. Authentication, reports and personal communications are the common …

A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing

M Alizadeh, MH Tadayon, K Sakurai, H Anada… - ACM Transactions on …, 2021 - dl.acm.org
Technology advances—such as improving processing power, battery life, and
communication functionalities—contribute to making mobile devices an attractive research …

[PDF][PDF] IOT and Machin Learning

A Khatri, A Peter - researchgate.net
Communication is the process of sending and receiving messages through signs or
language or behavior or any other means. Currently, person-to-person communication is …

Comments and improvements of “HOTA: Handover optimized ticket-based authentication in network-based mobility management”

M Alizadeh, MH Tadayon, K Sakurai… - … 20th Conference on …, 2017 - ieeexplore.ieee.org
Nowadays, various mobile devices are being an inseparable part of our normal life. Mobile
users tend to be connected to the Internet seamlessly, which is provided by mobility …