HR Jo, KS Pak, CH Kim, IJ Zhang - Plos one, 2022 - journals.plos.org
The authentication key agreement is a scheme that generates a session key for encrypted communication between two participants. In the authentication key agreement, to provide …
B Kang, Y Han, K Qian, J Du - Mathematical Problems in …, 2020 - Wiley Online Library
Recently, a number of authentication protocols integrated with the Internet of Things (IoT) and cloud computing have been proposed for secure access control on large‐scale IoT …
T Maitra, D Giri - Journal of medical systems, 2014 - Springer
The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or …
H Vasudev, D Das - … & Communications, Cloud & Big Data …, 2018 - ieeexplore.ieee.org
The rapid growth of information and communication technologies (ICT), opened a way to think the development of Smart city, which is introduced by the government of many …
With the agile development of the Internet era, starting from the message transmission to money transactions, everything is online now. Remote user authentication (RUA) is a …
C Meshram, RW Ibrahim, SG Meshram… - The Journal of …, 2022 - Springer
The study of chaotic constructions and their associated cryptographic frameworks has sparked a lot of research interest in recent years. Latest advances in wireless technology …
Abstract Multi-Server Authentication (MSA) provides the user an efficient way to avail multiple services of various multimedia service providers, once after getting registered from …
Security and privacy are the leading solicitude in cloud computing since users have restricted privilege on the data maintained by distinct service providers at remote locations …
S Shunmuganathan - Wireless Personal Communications, 2021 - Springer
Today's hyper-connected digital environment makes two-way authentication and secured key agreement a fundamental requirement for a secure connection. The research …