An improved anonymous authentication scheme for distributed mobile cloud computing services

SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon - Cluster Computing, 2019 - Springer
Mobile cloud computing blend mobile and cloud computing together with the help of
wireless communication technology to achieve benefits for the stakeholders. These …

A multiserver biometric authentication scheme for tmis using elliptic curve cryptography

SA Chaudhry, MT Khan, MK Khan, T Shon - Journal of medical systems, 2016 - Springer
Recently several authentication schemes are proposed for telecare medicine information
system (TMIS). Many of such schemes are proved to have weaknesses against known …

A provably secure anonymous authentication scheme for session initiation protocol

SA Chaudhry, I Khan, A Irshad… - Security and …, 2016 - Wiley Online Library
Recently, Lu et al. presented a mutual authentication scheme for Session Initiation Protocol.
Lu et al. claimed their scheme provides safeguard against familiar attacks and offers efficient …

An anonymous and provably secure biometric-based authentication scheme using chaotic maps for accessing medical drop box data

I Khan, SA Chaudhry, M Sher, JI Khan… - The Journal of …, 2018 - Springer
Telecare medicine information systems (TMISs) provides a platform to the participating
medical entities to share medical data over an insecure public channel. Medical drop box …

[HTML][HTML] Cryptanalysis and improvement of" a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks"

M Alizadeh, M Zamani, S Baharun, A Abdul Manaf… - PloS one, 2015 - journals.plos.org
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports
mobility without mobile nodes' participation in mobility signaling. The details of user …

[HTML][HTML] Security analysis and enhanced user authentication in proxy mobile IPv6 networks

D Kang, J Jung, D Lee, H Kim, D Won - PloS one, 2017 - journals.plos.org
The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that
allows a Mobile Node (MN) connected to the PMIPv6 domain to move from one network to …

[HTML][HTML] Secure ticket-based authentication method for IoT applications

M Alizadeh, MH Tadayon, A Jolfaei - Digital Communications and Networks, 2023 - Elsevier
The recent surge in the number of machines, appliances, and services connected to the
Internet demands secure processing and transmission of sensory data. Authentication plays …

[HTML][HTML] A narrative literature review on the impact of organizational context perspective on innovative health technology adoption

H Ahmadi, L Shahmoradi, F Sadoughi… - Journal of Soft …, 2018 - jscdss.com
Abstract Hospital Information System (HIS) is an integrated Information System (IS) designed
to enhance clinical, financial and administrative functions of a hospital. HIS is vital to the …

[HTML][HTML] A secure mobility network authentication scheme ensuring user anonymity

YF Chang, WL Tai, MH Hsu - Symmetry, 2017 - mdpi.com
With the rapid growth of network technologies, users are used to accessing various services
with their mobile devices. To ensure security and privacy in mobility networks, proper …

[PDF][PDF] Secure SMS Method Based on Social Networks

S Yazdanpanah, S Shojae Chaeikar - International Journal of …, 2016 - academia.edu
ABSTRACT Nowadays, Short Message Service (SMS) communications play important role
in daily lives. Authentication, reports and personal communications are the common …