Efficient privacy-preserving anonymous authentication scheme for human predictive online education system

S Jegadeesan, MS Obaidat, P Vijayakumar, M Azees… - Cluster …, 2022 - Springer
In recent years, online education systems (OES) are improved tremendously with the
development of information communication technology. Also, OES provides the opportunity …

Secure and lightweight authentication protocol for anonymous data access in cloud assisted iot system

V Mahor, R Padmavathy, S Chatterjee - Peer-to-Peer Networking and …, 2024 - Springer
Rapid evolution of IoT technologies has virtually made connectivity of all the real world
objects to the internet possible with the help of tiny embedded devices also known as IoT …

A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT

S Zhang, D Cao - The Journal of Supercomputing, 2024 - Springer
Edge computing server deployed at the edge of the network has promoted the development
of the Internet of Things (IoT) but also brings some security problems. Traditional IoT security …

LMAAS-IoT: Lightweight multi-factor authentication and authorization scheme for real-time data access in IoT cloud-based environment

AYF Alsahlani, A Popa - Journal of Network and Computer Applications, 2021 - Elsevier
Abstract Internet of Things (IoT) is a network of interconnected smart devices which provides
tremendous benefits and can be applied in various fields including, but not limited to …

Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things

S Roy, S Chatterjee, AK Das… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
The recent proliferation of mobile devices, such as smartphones and wearable devices has
given rise to crowdsourcing Internet of Things (IoT) applications. E-healthcare service is one …

Secure Three‐Factor Anonymous User Authentication Scheme for Cloud Computing Environment

H Lee, D Kang, Y Lee, D Won - Wireless Communications and …, 2021 - Wiley Online Library
Cloud computing provides virtualized information technology (IT) resources to ensure the
workflow desired by user at any time and location; it allows users to borrow computing …

A lightweight anonymous authentication and secure communication scheme for fog computing services

CY Weng, CT Li, CL Chen, CC Lee, YY Deng - IEEE Access, 2021 - ieeexplore.ieee.org
Fog-driven IoT architecture located between IoT devices and the centralized cloud
infrastructure is introduced to extend computing, storage and network services to the edge of …

Three-factor anonymous authentication and key agreement based on fuzzy biological extraction for Industrial Internet of Things

H Xu, C Hsu, L Harn, J Cui, Z Zhao… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the increasing popularity and wide application of the Internet, the users (such as
managers and data consumers) in the Industrial Internet of Things (IIoT) can remotely …

An improved identity-based anonymous authentication scheme resistant to semi-trusted server attacks

D Xie, J Yang, W Bian, F Chen… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
In mobile edge computing, the computing tasks of IoT terminal devices with limited
computing power often need to be offloaded to servers for processing. However, there are …

E-AUA: An efficient anonymous user authentication protocol for mobile IoT

X Zeng, G Xu, X Zheng, Y Xiang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The emergence of the mobile Internet of Things (IoT) has made our lives smarter, relying on
its various mobile IoT devices and services provided. However, with the explosively …