Government regulations in cyber security: Framework, standards and recommendations

J Srinivas, AK Das, N Kumar - Future generation computer systems, 2019 - Elsevier
Cyber security refers to the protection of Internet-connected systems, such as hardware,
software as well as data (information) from cyber attacks (adversaries). A cyber security …

Securing electronics healthcare records in healthcare 4.0: A biometric-based approach

JJ Hathaliya, S Tanwar, S Tyagi, N Kumar - Computers & Electrical …, 2019 - Elsevier
In recent years, there has been an exponential increase in the usage of Healthcare 4.0-
based diagnostics systems across the globe. In healthcare 4.0, the patient's records are …

Authenticated key agreement scheme for fog-driven IoT healthcare system

X Jia, D He, N Kumar, KKR Choo - Wireless Networks, 2019 - Springer
The convergence of cloud computing and Internet of Things (IoT) is partially due to the
pragmatic need for delivering extended services to a broader user base in diverse …

An efficient and provably secure authenticated key agreement protocol for fog-based vehicular ad-hoc networks

M Ma, D He, H Wang, N Kumar… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The maturity of cloud computing, the Internet of Things technology, and intelligent
transportation system has promoted the rapid development of vehicular ad-hoc networks …

An efficient and safe road condition monitoring authentication scheme based on fog computing

M Cui, D Han, J Wang - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
In recent years, with the development of intelligent vehicles and wireless sensor network
technology, the research on road safety has attracted much attention in vehicular ad-hoc …

Mobile banking: evolution and threats: malware threats and security solutions

M Wazid, S Zeadally, AK Das - IEEE Consumer Electronics …, 2019 - ieeexplore.ieee.org
Mobile banking refers to the use of a mobile device (eg, a smartphone) to perform online
banking activities, while away from the home computer, for transferring funds, monitoring …

Secure CLS and CL-AS schemes designed for VANETs

P Kumar, S Kumari, V Sharma, X Li… - the journal of …, 2019 - Springer
Abstract Vehicular Ad hoc Network (VANET) is a part of intelligent transport system facing
the problem of limited bandwidth. Certificateless aggregate signature (CL-AS) scheme gives …

Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography

B Ying, A Nayak - Journal of network and computer applications, 2019 - Elsevier
Due to small cell deployments and multiple servers in 5G networks, a fast and anonymous
mutual authentication protocol needs to be developed for complex 5G networks. In this …

A lightweight secure user authentication and key agreement protocol for wireless sensor networks

J Mo, H Chen - Security and Communication Networks, 2019 - Wiley Online Library
Wireless sensor networks (WSNs) have great potential for numerous domains of application
because of their ability to sense and understand unattended environments. However, a …

Privacy-preserving aware data transmission for IoT-based e-health

R Boussada, B Hamdane, ME Elhdhili, LA Saidane - Computer Networks, 2019 - Elsevier
Abstract Internet of Things (IoT) is an emerging networking paradigm that aims to improve
human daily life. It includes a huge number of interactive nodes that generate, aggregate …