LNSC: A security model for electric vehicle and charging pile management based on blockchain ecosystem

X Huang, C Xu, P Wang, H Liu - IEEE access, 2018 - ieeexplore.ieee.org
The Internet of Energy (IoE) provides an effective networking technology for distributed
green energy, which allows the connection of energy anywhere at any time. As an important …

A privacy preserving three-factor authentication protocol for e-health clouds

Q Jiang, MK Khan, X Lu, J Ma, D He - The Journal of Supercomputing, 2016 - Springer
E-Health clouds are gaining increasing popularity by facilitating the storage and sharing of
big data in healthcare. However, such an adoption also brings about a series of challenges …

[HTML][HTML] Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology

MF Ayub, K Mahmood, S Kumari… - Digital Communications …, 2021 - Elsevier
Modern information technology has been utilized progressively to store and distribute a
large amount of healthcare data to reduce costs and improve medical facilities. In this …

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems

Q Jiang, Z Chen, B Li, J Shen, L Yang, J Ma - Journal of Ambient …, 2018 - Springer
The deployment of telecare medical information system (TMIS) over public networks gives
rise to the threat of exposing sensitive medical information to illegal entities. Although a …

A novel encryption scheme for colored image based on high level chaotic maps

M Mollaeefar, A Sharif, M Nazari - Multimedia Tools and Applications, 2017 - Springer
In the following paper, the novel method for color image encryption has proposed based on
high level chaotic maps. We introduced two novel chaotic maps “Cosinus-Arcsinus (CA)” …

An enhanced lightweight anonymous biometric based authentication scheme for TMIS

SA Chaudhry, H Naqvi, MK Khan - Multimedia Tools and Applications, 2018 - Springer
In recent past, Mir and Nikooghadam presented an enhanced biometrics based
authentication scheme using lightweight symmetric key primitives for telemedicine networks …

A lightweight authentication and key agreement protocol preserving user anonymity

M Nikooghadam, R Jahantigh, H Arshad - Multimedia Tools and …, 2017 - Springer
Nowadays with widespread employment of the Internet, servers provide various services for
legal users. The vital issue in client/server connections is authentication protocols that make …

A secure three-factor-based authentication with key agreement protocol for e-Health clouds

Y Chen, J Chen - The Journal of Supercomputing, 2021 - Springer
The rapid development of electronic healthcare (e-Health) has brought great convenience to
people's life. In order to guarantee the security of users, a large number of identity …

A novel method for digital image steganography based on a new three-dimensional chaotic map

A Sharif, M Mollaeefar, M Nazari - Multimedia Tools and Applications, 2017 - Springer
This paper, presents a novel chaos-based image steganography algorithm. Because of
efficient property of chaos based security systems besides steganography applicability in …

A secure and robust elliptic curve cryptography‐based mutual authentication scheme for session initiation protocol

M Nikooghadam, H Amintoosi - Security and privacy, 2020 - Wiley Online Library
Session initiation protocol (SIP) is known as multimedia communication protocol based on
IP, which is leveraged to provide signaling as well as instant messaging services. Since SIP …