A clogging resistant secure authentication scheme for fog computing services

Z Ali, SA Chaudhry, K Mahmood, S Garg, Z Lv… - Computer Networks, 2021 - Elsevier
Fog computing (FC) is an infrastructure consisting of decentralized computing, where
computing resources such as storage, applications, and data are scattered among the cloud …

[Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server

N Khan, J Zhang, SU Jan - Security and Communication …, 2022 - Wiley Online Library
Everyone desires to avail online services provided by different service providers securely,
efficiently, and effectively. In this regard, security is still a significant concern for them …

Authentication protocol for cloud databases using blockchain mechanism

G Deep, R Mohana, A Nayyar, P Sanjeevikumar… - Sensors, 2019 - mdpi.com
Cloud computing has made the software development process fast and flexible but on the
other hand it has contributed to increasing security attacks. Employees who manage the …

A novel pairing-free lightweight authentication protocol for mobile cloud computing framework

A Irshad, SA Chaudhry, OA Alomari… - IEEE Systems …, 2020 - ieeexplore.ieee.org
The mobile cloud computing (MCC) refers to an infrastructure that integrates cloud
computing and mobile computing, and it has changed a great deal, the service provisioning …

Privacy and data protection in mobile cloud computing: A systematic mapping study

HM Alnajrani, AA Norman, BH Ahmed - Plos one, 2020 - journals.plos.org
As a result of a shift in the world of technology, the combination of ubiquitous mobile
networks and cloud computing produced the mobile cloud computing (MCC) domain. As a …

Blockchain-based privacy-preserving authentication protocol for UAV networks

MA Akram, H Ahmad, AN Mian, AD Jurcut, S Kumari - Computer Networks, 2023 - Elsevier
Unmanned aerial vehicles (UAVs) are getting common in the market nowadays and being
used in numerous real-time applications because they are lightweight, cost-effective, easy to …

Designing an efficient and secure message exchange protocol for internet of vehicles

SA Chaudhry - Security and Communication Networks, 2021 - Wiley Online Library
In the advancements in computation and communication technologies and increasing
number of vehicles, the concept of Internet of Vehicles (IoV) has emerged as an integral part …

Enhanced authentication protocol for the Internet of Things environment

CM Chen, X Li, S Liu, ME Wu… - Security and …, 2022 - Wiley Online Library
The Internet of Things (IoT) is among the most promising technologies of the future, and its
development has garnered attention worldwide. However, the rise of the IoT has been …

Blockchain based privacy preserving user authentication protocol for distributed mobile cloud environment

M Vivekanandan, S VN, SR U - Peer-to-Peer Networking and Applications, 2021 - Springer
The development in cloud computing platforms has resulted, hosting many day-to-day
service applications in the cloud. To avail the services provided by different cloud service …

Harnessing the power and simplicity of decision trees to detect IoT Malware

M Omar, R Jones, DN Burrell, M Dawson… - Transformational …, 2023 - igi-global.com
Due to its simple installation and connectivity, the internet of things (IoT) is susceptible to
malware attacks. As IoT devices have become more prevalent, they have become the most …