Light-weight hashing method for user authentication in Internet-of-Things

V Rao, KV Prema - Ad Hoc Networks, 2019 - Elsevier
The goal of Internet-of-Things (IoT) is that every object across the globe be interconnected
under the Internet Infrastructure. IoT is expanding its application domain to range from …

[PDF][PDF] Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption.

S Yin, J Liu, L Teng - Int. J. Netw. Secur., 2020 - isrc.asia.edu.tw
Medical image contains sensitive information of patients. In order to improve the efficiency
and security of medical image encryption, we propose an improved elliptic curve …

Cryptanalysis and improvement of ECC based authentication and key exchanging protocols

S Roy, C Khatwani - Cryptography, 2017 - mdpi.com
Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication
protocols. In this work, various recent ECC-based authentication and key exchange …

An efficient and low cost Windows Mobile BSN monitoring system based on TinyOS

ORE Pereira, JMLP Caldeira, L Shu… - Telecommunication …, 2014 - Springer
Monitoring methods for human body parameters are used over years to identify health
conditions and biofeedback. For example, the core-body temperature is correlated with …

An improvement of a elliptic curve digital signature algorithm

MK Chande, CC Lee - International Journal of Internet …, 2016 - inderscienceonline.com
The elliptic curve digital signature algorithm (ECDSA) is the first successful algorithm based
on elliptic curve and it is elliptic curve analogue of digital signature algorithm (DSA). The …

An efficient authentication protocol for mobile communications

CC Lee, IE Liao, MS Hwang - Telecommunication Systems, 2011 - Springer
In this paper, a new Global System of Mobile Communications (GSM) authentication
protocol is proposed to improve some drawbacks of the current GSM authentication protocol …

[PDF][PDF] Secure Encryption of Parallel Chaotic English Education Data Based on 4-order Cellular Neural Network

M Wei - database, 2023 - ijns.jalaxy.com.tw
Abstract In English education, the security of English data is very important. It is related to the
leakage of English data in the transmission process. In order to solve the problem of …

[PDF][PDF] A PUF-based Group Key Transfer Protocol for Bluetooth.

S Li, B Yu, Y Huang - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
Group key is the basis for ensuring the security of bluetooth broadcast messages. Recently,
aiming at establishing group key among resource-constrained devices, Hsu et al. and Piao …

A secure protocol for patient monitoring in wireless body area networks

P Tyagi, S Kumari, MK Gupta, CM Chen… - Concurrency and …, 2023 - Wiley Online Library
Recently, an authentication scheme was presented for health‐care in IoT for WBANs by
Fotouhi et al. Authors asserted their scheme to be free from a number of attacks. Here, we …

A practical RFID authentication mechanism for digital television

CC Lee, CT Chen, CT Li, PH Wu - Telecommunication Systems, 2014 - Springer
As information technology continuously progresses, more applied technologies are
developed, such as radio frequency identification (RFID). In this paper, we propose a novel …