[HTML][HTML] Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review

SA Sheik, AP Muniyandi - Cyber Security and Applications, 2023 - Elsevier
The fast growth of the cloud computing technology has led to immense development in the
public and private sectors. Cloud computing provides a high level of virtualization, massive …

[PDF][PDF] Enhancement of online education in engineering college based on mobile wireless communication networks and IoT

JQ Kadhim, IA Aljazaery… - International Journal of …, 2023 - researchgate.net
The field of Engineering is that which needs a high level of analytical thinking, intuitive
knowledge, and technical know-how. The area of communication engineering deals with …

The effectiveness and privacy preservation of IoT on ubiquitous learning: Modern learning paradigm to enhance higher education

N El-Haggar, L Amouri, A Alsumayt, FH Alghamedy… - Applied Sciences, 2023 - mdpi.com
The progress made in Information and Communication Technologies (ICT) has played a
crucial role in turning the Internet of Things (IoT) into a reality. IoT is an emerging technology …

An efficient and privacy-preserving blockchain-based authentication scheme for low earth orbit satellite-assisted internet of things

B Wang, Z Chang, S Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recently, integrating satellite networks (eg, low-Earth-orbit (LEO) satellite constellation) into
the Internet of Things (IoT) ecosystem has emerged as a potential paradigm to provide more …

An effective and enhanced RSA based public key encryption scheme (XRSA)

R Imam, F Anwer, M Nadeem - International Journal of Information …, 2022 - Springer
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …

Blockchain-enabled secure data collection scheme for fog-based WBAN

J Subramani, A Maria, A Aljaedi, AS Rajasekaran… - IEEE …, 2024 - ieeexplore.ieee.org
Wireless body area networks () are essential components of intelligent healthcare
monitoring techniques. Especially, when the number and datatype in increases. In, secure …

A reliable protocol for data aggregation and optimized routing in IoT WSNs based on machine learning

N Chandnani, CN Khairnar - Wireless Personal Communications, 2023 - Springer
Abstract Data Aggregation for IoT-WSN, based on Machine Learning (ML), allows the
Internet of Things (IoT) and Wireless Sensor Networks (WSN) to send accurate data to the …

A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture

S Shukla, SJ Patel - Cluster Computing, 2024 - Springer
The emerging cloud infrastructure has escalated number of servers offering flexible and
diverse remote services through public channels. However, user authentication in …

An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments

C Meshram, RW Ibrahim, P Yupapin, I Bahkali… - The Journal of …, 2023 - Springer
Signcryption is a highly efficient approach to simultaneously achieving message
confidentiality and authentication in Human-Centered IoT (HC-IoT) systems. HCIoT is a new …

[HTML][HTML] Cryptanalysis on “a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity”

A Singh, M Karuppiah, RP Mahapatra - Cyber Security and Applications, 2023 - Elsevier
The health-care delivery services were made possible by telecare medicine information
systems (TMIS). These systems are paving the way for a world where computerised telecare …