[Retracted] FHAAPS: Efficient Anonymous Authentication with Privacy Preservation Scheme for Farm‐to‐Home Communication

AS Rajasekaran, M Azees… - Security and …, 2023 - Wiley Online Library
With the advancement in information and communication technology (ICT), secure farm‐to‐
home communication has become an emerging concept. Food is the most basic essential …

A Blockchain‐Based Privacy Preservation Scheme in Mobile Medical

H Wen, M Wei, D Du, X Yin - Security and Communication …, 2022 - Wiley Online Library
With the rapid development of mobile medical, how to establish an effective security
mechanism to protect data security and privacy while users enjoy medical services has …

[PDF][PDF] Insider Attack Detection Using Deep Belief Neural Network in Cloud Computing.

AS Anakath, R Kannadasan, NP Joseph… - … Systems Science & …, 2022 - researchgate.net
Cloud computing is a high network infrastructure where users, owners, third users,
authorized users, and customers can access and store their information quickly. The use of …

Current‐Fed Bidirectional DC‐DC Converter Topology for Wireless Charging System Electrical Vehicle Applications

PS Subudhi, M Thilagaraj… - Wireless …, 2021 - Wiley Online Library
This paper compares the efficiency of a modified wireless power transfer (WPT) system with
a current‐fed dual‐active half‐bridge converter topology and a complete bridge converter …

Hybrid CMOS Memristor Based Biometric OBU Authentication and Anonymous Mutual Authentication for Secure Communication in Fog-Based VANETs

M Azees, AS Rajasekaran… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The progression of cloud computing, IoT technologies, and intelligent transportation systems
has accelerated the speedy growth of vehicular ad-hoc networks (VANETs). Recently …

Secure Authentication Scheme for Medical care applications based on IoT

AS Rajasekaran, D Yuvaraj… - … Conference on Emerging …, 2022 - ieeexplore.ieee.org
In the medical business, the Internet of Medical Things (IoMT) has turned into a specialist
application framework. It is utilized to accumulate and break down the physiological …

A dynamic anonymous authentication scheme with trusted fog computing in V2G networks

W Huang, H Du, J Feng, G Han, W Zhang - Journal of Information Security …, 2023 - Elsevier
As an important component of smart grid, vehicle-to-grid (V2G) is helpful to improve grid
stability, save on generation costs, and reduce energy consumption. However, the existing …

SDESA: secure cloud computing with gradient deep belief network and congruential advanced encryption

S Rani, PV Pravija Raj, AM Khedr - The Journal of Supercomputing, 2024 - Springer
With the aim to enhance cloud security with higher data confidentiality rate and integrity, we
propose a novel technique called Stochastic Deep Encryption Standard Algorithm (SDESA) …

An Optimal Modified Bidirectional Generative Adversarial Network for Security Authentication in Cloud Environment

N Subramanian - Cybernetics and Systems, 2024 - Taylor & Francis
In the contemporary world, mobile appliances are connected to a cloud environment for
balancing the wide range of data that is created. Because of the shortage of security and …

A secure anonymous authentication and key agreement schemes for Wireless Body Area Networks

S Vanjarapu, HK Yadagiri, S Gedela… - … on Advances in …, 2022 - ieeexplore.ieee.org
As wireless communication technologies are becoming more advanced, Wireless Body Area
Networks (WBANs) become essential components of modern health care systems for patient …