[HTML][HTML] A three-factor anonymous user authentication scheme for Internet of Things environments

H Lee, D Kang, J Ryu, D Won, H Kim, Y Lee - Journal of Information …, 2020 - Elsevier
To accelerate the deployment of fifth-generation (5G) cellular networks, millions of devices
are being connected to massive Internet of Things (IoT) networks. However, advances in the …

Enhancing user prompt confidentiality in Large Language Models through advanced differential encryption

BB Gupta, A Gaurav, V Arya, W Alhalabi… - Computers and …, 2024 - Elsevier
In the era of artificial intelligence (AI) advancements heralded by Large Language Models
(LLMs) like GPT-3, the capacity to parse and generate human-like text brings to light …

Computational efficient authenticated digital content distribution frameworks for DRM systems: Review and outlook

S Rana, MS Obaidat, D Mishra… - IEEE Systems …, 2020 - ieeexplore.ieee.org
Advancement in digital technologies presents a user-friendly environment for the digital
content distribution. However, it makes digital content prone to piracy issues. Digital rights …

A lightweight and provable secured certificateless signcryption approach for crowdsourced IIoT applications

I Ullah, N Ul Amin, M Zareei, A Zeb, H Khattak, A Khan… - Symmetry, 2019 - mdpi.com
Industrial Internet of Things (IIoT) is a new type of Internet of Things (IoT), which enables
sensors to merge with several smart devices to monitor machine status, environment, and …

Lightweight collaborative authentication with key protection for smart electronic health record system

Q Feng, D He, H Wang, L Zhou… - IEEE Sensors …, 2019 - ieeexplore.ieee.org
When wireless body area network (WBAN) is playing an increasing role in modern medical
systems, smart electronic health record (SEHR) system is heralded primarily as an …

A lightweight three-factor authentication protocol for digital rights management system

SJ Yu, KS Park, YH Park, HP Kim, YH Park - Peer-to-peer Networking and …, 2020 - Springer
Recent advances in communication technology and low-power devices have led digital-
content services to be provided in various resource limited environments such as smart …

SMASG: Secure mobile authentication scheme for global mobility network

J Ryu, H Lee, Y Lee, D Won - IEEE Access, 2022 - ieeexplore.ieee.org
The rapid growth of the Internet of Things (IoT) has enabled prompt services over mobile
devices. The Global Mobility Network (GLOMONET) is an important global network that …

RFID authentication scheme based on hyperelliptic curve signcryption

U Ali, MYIB Idris, MNB Ayub, I Ullah, I Ali… - IEEE …, 2021 - ieeexplore.ieee.org
The implementation of efficient security mechanisms for Radio Frequency Identification
(RFID) system has always been a continuous challenge due to its limited computing …

An improved authentication scheme for digital rights management system

S Hussain, YB Zikria, GA Mallah… - Wireless …, 2022 - Wiley Online Library
With the increasing number and popularity of digital content, the management of digital
access rights has become an utmost important field. Through digital rights management …

A secure remote mutual authentication scheme based on chaotic map for underwater acoustic networks

S Zhang, X Du, X Liu - IEEE Access, 2020 - ieeexplore.ieee.org
Underwater acoustic networks (UANs) have emerged as a new wireless sensor network
structure widely used in many applications. Sensor nodes are usually placed in a hostile …