A lightweight block cipher technique for IoT based E-healthcare system security

K Chatterjee, RRK Chaudhary, A Singh - Multimedia Tools and …, 2022 - Springer
All the real and virtual IoT devices are connected to provide intelligent and decision-making
services. Each IoT based application is designed for some specific purpose and function …

An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system

Y Chen, J Chen - Peer-to-Peer Networking and Applications, 2022 - Springer
Telecare medicine information system (TMIS) is developing rapidly and widely used with the
support of computer, communication and other advanced technologies. It can ensure the …

[HTML][HTML] A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks

KS Roy, S Deb, HK Kalita - Digital Communications and Networks, 2022 - Elsevier
Abstract The Internet of Things (IoT) has taken the interconnected world by storm. Due to
their immense applicability, IoT devices are being scaled at exponential proportions …

ECC-based lightweight authentication and access control scheme for IoT E-healthcare

H Yao, Q Yan, X Fu, Z Zhang, C Lan - Soft Computing, 2022 - Springer
The E-healthcare system has a complex architecture, diverse business types, and sensitive
data security. To meet the secure communication and access control requirements in the …

Cryptanalysis and improved mutual authentication key agreement protocol using pseudo-identity

HR Jo, KS Pak, CH Kim, IJ Zhang - Plos one, 2022 - journals.plos.org
The authentication key agreement is a scheme that generates a session key for encrypted
communication between two participants. In the authentication key agreement, to provide …

An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric

C Meshram, RW Ibrahim, SG Meshram… - The Journal of …, 2022 - Springer
The study of chaotic constructions and their associated cryptographic frameworks has
sparked a lot of research interest in recent years. Latest advances in wireless technology …

Cloud-assisted secure and cost-effective authenticated solution for remote wearable health monitoring system

K Mahmood, MS Obaidat, Z Ghaffar… - … on Network Science …, 2022 - ieeexplore.ieee.org
Security and privacy are the leading solicitude in cloud computing since users have
restricted privilege on the data maintained by distinct service providers at remote locations …

A novel three-factor authentication scheme with high security for multi-server environments

R Chen, Y Mou, M Zhang - Wireless Personal Communications, 2022 - Springer
In a multi-sever scenario, a two-party remote user authentication scheme is faced with
various kinds of security threats. The introduction of biometric technology can effectively …

Improved anonymity preserving three-party mutual authentication key exchange protocol based on chaotic maps

KS Pak, MH Kim, SH Pak, CM Ho - Plos one, 2022 - journals.plos.org
Three-party authentication key exchange is a protocol that allows two users to set up a
session key for encrypted communication by the help of a trusted remote server. Providing …

Linear feedback shift register and integer theory: a state-of-art approach in security issues over e-commerce

A Bhowmik, S Karforma - Electronic Commerce Research, 2022 - Springer
Electronic commerce is the buying and selling of goods and services, or the funds transfer
between independent organizations and/or persons over an electronic wireless network …