A secure and privacy-preserving mutual authentication system for global roaming in mobile networks

R Shashidhara, M Lajuvanthi, S Akhila - Arabian Journal for Science and …, 2022 - Springer
Mutual authentication scheme plays a significant role in the global mobility network to afford
roaming service. However, designing secure and privacy-preserving authentication …

[HTML][HTML] Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain

H Wang, H Huang, Y Qin, Y Wang, M Wu - ISPRS International Journal of …, 2017 - mdpi.com
Currently, although prevalent location privacy methods based on k-anonymizing spatial
regions (K-ASRs) can achieve privacy protection by sacrificing the quality of service (QoS) …

[PDF][PDF] Security enhanced anonymous user authenticated key agreement scheme using smart card

J Jung, D Lee, H Lee, D Won - Journal of Electronic Science …, 2018 - journal.uestc.edu.cn
Nowadays, password-based remote user authentication mechanism using smart card is one
of the simplest and convenient authentication ways to ensure secure communication over …

Continuous user authentication based on context-emphasized behavior profiling

S Fu, ML Wymore, TW Chang… - 2019 IEEE 43rd Annual …, 2019 - ieeexplore.ieee.org
The restriction of access to software systems is more important than ever. For example,
critical data is increasingly being stored on web services that are accessible from anywhere …

Cryptanalysis of improved and provably secure three-factor user authentication scheme for wireless sensor networks

J Ryu, T Song, J Moon, H Kim, D Won - Computational Science and …, 2019 - Springer
Wireless sensor networks are applied in various areas like smart grid, environmental
monitoring, health care, and security and surveillance. It applies to many fields, but as the …

[PDF][PDF] Robust biometric-based anonymous user authenticated key agreement scheme for telecare medicine information systems

J Jung, J Moon, D Won - … on Internet and Information Systems (TIIS), 2017 - koreascience.kr
At present, numerous hospitals and medical institutes have implemented Telecare Medicine
Information Systems (TMIS) with authentication protocols to enable secure, efficient …

A novel software system protection scheme based on behavior and context monitoring

S Fu, ML Wymore, TW Chang, D Qiao - International Journal of …, 2019 - igi-global.com
The restriction of access to software systems is more important than ever. Yet, most primary
authentication methods are still largely based on passwords, which are vulnerable to …

Two-factor authentication scheme using one time password in cloud computing

SH El-sherif, RF Abdel-kader, RY Rizk - Proceedings of the International …, 2019 - Springer
Cloud computing is widely used by many users, so any one must be authenticated before
accessing any service into the cloud. In this paper, a two-factor authentication scheme is …

Maintaining Fog Trust Through Continuous Assessment

HA Khattak, M Imran, A Abbas, SU Khan - … World Congress, Held as Part of …, 2019 - Springer
Cloud computing continues to provide flexible and efficient way for delivery of services,
meeting user requirements and challenges of the time. Software, Infrastructures, and …

Improvement of user authentication scheme preserving uniqueness and anonymity for connected health care

J Moon, H Yang, Y Lee, D Won - … of the 11th International Conference on …, 2017 - dl.acm.org
Connected health care is a remotely healthcare system and it provides several services
including telecare medicine, personally controlled health record, patient monitoring and so …