I ul Haq, J Wang, Y Zhu, S Maqbool - Journal of Information Security and …, 2020 - Elsevier
This paper presents a comprehensive survey of authenticated key agreement protocols, which have been proposed for multi-server architectures. The growing use of cloud-based …
CC Chang, NT Nguyen - Wireless Personal Communications, 2016 - Springer
Online access has been widely adopted to distribute diversified services to customers. In this architecture, public channels are utilized to exchange information between end users and …
M Luo, Y Zhang, MK Khan, D He - International Journal of …, 2017 - Wiley Online Library
The e‐commerce has got great development in the past decades and brings great convenience to people. Users can obtain all kinds of services through e‐commerce platform …
Purpose–With the rapid growth of Chinese mobile pay market, it's necessary to run a study of the aims why users prefer to intention of use for mobile fingerprint payment. To reach this …
YH Chuang, CL Lei - International Journal of Communication …, 2021 - Wiley Online Library
In the past decades, the demand for remote mutual authentication and key agreement (MAKA) scheme with privacy preserving grows rapidly with the rise of the right to privacy and …
S Wu, A Zhang, J Chen, G Peng, Y Gao - Wireless Personal …, 2023 - Springer
Internet of medical things (IoMT) enable physicians to provide precise care on the Internet for registered patients anywhere, bringing convenience to people's everyday life …
SU Jan, F Qayum - Network and Communication Technologies, 2018 - papers.ssrn.com
Client-server computing is the analytical development of compatible programming with significant supposition and the detachment of a massive program into its fundamental parts …
V Odelu, AK Das, KKR Choo, N Kumar, Y Park - IEEE Access, 2017 - ieeexplore.ieee.org
In recent years, mobile devices are becoming an integrated part of our society, and this reinforces the need for security and privacy without incurring additional communication and …
PC Gupta, J Dhar - Wireless Personal Communications, 2016 - Springer
With the aim to use numerous network based services through one time user/client registration, lots of works have been done. Most of the work uses password based login …