A lightweight message authentication scheme for smart grid communications in power sector

K Mahmood, SA Chaudhry, H Naqvi, T Shon… - Computers & Electrical …, 2016 - Elsevier
Abstract The Internet of Things (IoT) has plenty of applications including Smart Grid (SG). IoT
enables smooth and efficient utilization of SG. It is assumed as the prevalent illustration of …

A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks

BA Alzahrani, A Irshad, A Albeshri, K Alsubhi - Wireless Personal …, 2021 - Springer
Burgeoning wireless technology developments have positively affected nearly every aspect
of human life, and remote patient-healthcare monitoring through the internet is no exception …

An improved anonymous authentication scheme for distributed mobile cloud computing services

SA Chaudhry, IL Kim, S Rho, MS Farash, T Shon - Cluster Computing, 2019 - Springer
Mobile cloud computing blend mobile and cloud computing together with the help of
wireless communication technology to achieve benefits for the stakeholders. These …

A provably secure ECC-based access and handover authentication protocol for space information networks

J Guo, Y Du, Y Zhang, M Li - Journal of Network and Computer Applications, 2021 - Elsevier
At present, space information networks are widely used in various fields and gradually
attract more and more users to access. However, because the wireless channel in space …

EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs

Y Xie, LB Wu, J Shen, A Alelaiwi - Telecommunication Systems, 2017 - Springer
In VANETs, vehicles broadcast traffic-related messages periodically according to Dedicated
Short Range Communication protocol. To ensure the reliability and integrity of messages …

A multiserver biometric authentication scheme for tmis using elliptic curve cryptography

SA Chaudhry, MT Khan, MK Khan, T Shon - Journal of medical systems, 2016 - Springer
Recently several authentication schemes are proposed for telecare medicine information
system (TMIS). Many of such schemes are proved to have weaknesses against known …

Ensemble SW image steganalysis: A low dimension method for LSBR detection

SS Chaeikar, A Ahmadi - Signal Processing: Image Communication, 2019 - Elsevier
Blind steganalysis examines digital media for the likely existence of hidden messages,
without prior knowledge of the steganographic algorithm that may have been used to hide …

A secure and robust smart card-based remote user authentication scheme

K Dowlatshah, M Alizadeh, MA Raji… - … Journal of Internet …, 2020 - inderscienceonline.com
In the new era of technology, smart cards play a critical role in economic and social
interactions. Security vulnerabilities of these smart cards are the main concern for many …

A privacy protection user authentication and key agreement scheme tailored for the Internet of Things environment: PriAuth

Y Chen, JF Martínez, P Castillejo… - … and Mobile Computing, 2017 - Wiley Online Library
In a wearable sensor‐based deployment, sensors are placed over the patient to monitor
their body health parameters. Continuous physiological information monitored by wearable …

AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks

J Guo, L Chang, Y Song, S Yao, Z Zheng, Y Hao… - Computer Standards & …, 2025 - Elsevier
At present, the rapid development of satellite capabilities has prompted the proposal of
satellite–terrestrial integrated networks (STIN), which solves the problem of limited signal …