Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments

M Mohammedi, M Omar, A Bouabdallah - Journal of Ambient Intelligence …, 2018 - Springer
Biometrics is an emerging technology for patient authentication due to its advantages over
the other methods, as passwords and smart cards. However, in mobile environments, it …

Cryptanalysis and improved mutual authentication key agreement protocol using pseudo-identity

HR Jo, KS Pak, CH Kim, IJ Zhang - Plos one, 2022 - journals.plos.org
The authentication key agreement is a scheme that generates a session key for encrypted
communication between two participants. In the authentication key agreement, to provide …

Analysis and Improvement on an Authentication Protocol for IoT‐Enabled Devices in Distributed Cloud Computing Environment

B Kang, Y Han, K Qian, J Du - Mathematical Problems in …, 2020 - Wiley Online Library
Recently, a number of authentication protocols integrated with the Internet of Things (IoT)
and cloud computing have been proposed for secure access control on large‐scale IoT …

An efficient biometric and password-based remote user authentication using smart card for telecare medical information systems in multi-server environment

T Maitra, D Giri - Journal of medical systems, 2014 - Springer
The medical organizations have introduced Telecare Medical Information System (TMIS) to
provide a reliable facility by which a patient who is unable to go to a doctor in critical or …

A lightweight authentication protocol for V2V communication in VANETs

H Vasudev, D Das - … & Communications, Cloud & Big Data …, 2018 - ieeexplore.ieee.org
The rapid growth of information and communication technologies (ICT), opened a way to
think the development of Smart city, which is introduced by the government of many …

An enhanced approach for three factor remote user authentication in multi-server environment

C Patel, D Joshi, N Doshi… - Journal of Intelligent …, 2020 - content.iospress.com
With the agile development of the Internet era, starting from the message transmission to
money transactions, everything is online now. Remote user authentication (RUA) is a …

An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric

C Meshram, RW Ibrahim, SG Meshram… - The Journal of …, 2022 - Springer
The study of chaotic constructions and their associated cryptographic frameworks has
sparked a lot of research interest in recent years. Latest advances in wireless technology …

An improved and secure chaotic map based authenticated key agreement in multi-server architecture

A Irshad, M Sher, SA Chaudhry, Q Xie… - Multimedia Tools and …, 2018 - Springer
Abstract Multi-Server Authentication (MSA) provides the user an efficient way to avail
multiple services of various multimedia service providers, once after getting registered from …

Cloud-assisted secure and cost-effective authenticated solution for remote wearable health monitoring system

K Mahmood, MS Obaidat, Z Ghaffar… - … on Network Science …, 2022 - ieeexplore.ieee.org
Security and privacy are the leading solicitude in cloud computing since users have
restricted privilege on the data maintained by distinct service providers at remote locations …

A reliable lightweight two factor mutual authenticated session key agreement protocol for multi-server environment

S Shunmuganathan - Wireless Personal Communications, 2021 - Springer
Today's hyper-connected digital environment makes two-way authentication and secured
key agreement a fundamental requirement for a secure connection. The research …