An exhaustive survey on security and privacy issues in Healthcare 4.0

JJ Hathaliya, S Tanwar - Computer Communications, 2020 - Elsevier
The healthcare industry has revolutionized from 1.0 to 4.0 where Healthcare 1.0 was more
doctor centric and Healthcare 2.0 replaced manual records with electronic healthcare …

Machine learning models for secure data analytics: A taxonomy and threat model

R Gupta, S Tanwar, S Tyagi, N Kumar - Computer Communications, 2020 - Elsevier
In recent years, rapid technological advancements in smart devices and their usage in a
wide range of applications exponentially increases the data generated from these devices …

Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices

S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …

Smart mutual authentication protocol for cloud based medical healthcare systems using internet of medical things

BD Deebak, F Al-Turjman - IEEE Journal on Selected Areas in …, 2020 - ieeexplore.ieee.org
Technological development expands the computation process of smart devices that adopt
the telecare medical information system (TMIS) to fulfill the demands of the healthcare …

A survey on methods and challenges in EEG based authentication

AJ Bidgoly, HJ Bidgoly, Z Arezoumand - Computers & Security, 2020 - Elsevier
EEG is the recording of electrical activities of the brain, usually along the scalp surface,
which are the results of synaptic activations of the brain's neurons. In recent years, it has …

Understanding security failures of multi-factor authentication schemes for multi-server environments

D Wang, X Zhang, Z Zhang, P Wang - Computers & Security, 2020 - Elsevier
Revealing the security flaws of existing cryptographic protocols is the key to understanding
how to achieve better security. Dozens of multi-factor authentication schemes for multi …

A novel pairing-free lightweight authentication protocol for mobile cloud computing framework

A Irshad, SA Chaudhry, OA Alomari… - IEEE Systems …, 2020 - ieeexplore.ieee.org
The mobile cloud computing (MCC) refers to an infrastructure that integrates cloud
computing and mobile computing, and it has changed a great deal, the service provisioning …

Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing

H Kaur, P Khanna - Future Generation Computer Systems, 2020 - Elsevier
Biometric authentication over cloud and network applications demands a wide range of
solutions against increasing cyber crimes and digital identity thefts. This work addresses …

Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks

J Wang, Y Zhu - Journal of Network and Computer Applications, 2020 - Elsevier
Abstract Recently Ying and Nayak proposed a multi-server supported lightweight
authentication protocol for 5G networks and confirmed the security of their protocol against …

Efficient and privacy-preserving authentication scheme for wireless body area networks

M Shuai, B Liu, N Yu, L Xiong, C Wang - Journal of Information Security and …, 2020 - Elsevier
As a significant part of electronic health, wireless body area networks (WBANs) have greatly
improved the quality and efficiency of healthcare. With the help of WBANs, comprehensive …