Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

TY Wu, F Kong, Q Meng, S Kumari… - EURASIP Journal on …, 2023 - Springer
With the continuous progress of the Internet of Things (IoT) technology, IoT devices have
gradually penetrated all aspects of life. However, due to rapid data growth, IoT devices with …

Lightweight privacy‐aware secure authentication scheme for cyber‐physical systems in the edge intelligence era

D Bakkiam Deebak… - … and Computation: Practice …, 2023 - Wiley Online Library
Abstract Internet of Things (IoT) and cyber‐physical systems demand proper real‐time data
processing and analysis to fulfill the essential characteristics of seamless computing …

A blockchain-assisted lightweight anonymous authentication scheme for medical services in internet of medical things

S Wu, A Zhang, J Chen, G Peng, Y Gao - Wireless Personal …, 2023 - Springer
Internet of medical things (IoMT) enable physicians to provide precise care on the Internet
for registered patients anywhere, bringing convenience to people's everyday life …

An Anonymous Authenticated Key Agreement Protocol Secure in Partially Trusted Registration Server Scenario for Multi-Server Architectures

I ul Haq, J Wang, Y Zhu, S Nasir - Cryptology ePrint Archive, 2023 - eprint.iacr.org
The accelerated advances in information communication technologies have made it
possible for enterprises to deploy large scale applications in a multi-server architecture (also …

A Secure Cross-Domain Access Control Scheme for Internet of Medical Things

N Liu, Q Zhao, T Shi - Proceedings of the 2023 6th International …, 2023 - dl.acm.org
As a new medical information technology, the Internet of Medical Things (IoMT) is
developing rapidly and being widely applied. However, the security of massive medical data …

Lightweight Authentication Protocol for E-Healthcare Systems Using Fuzzy Commitment Scheme

J Dutta, S Barman, R Bandyopadhyay… - Frontiers of ICT in …, 2023 - Springer
Authentication schemes are now getting importance in the field of the medical system.
Medical data are private and sensitive to a patient, therefore, during sharing of data, privacy …

[PDF][PDF] A Multi-Factor Certificateless Authenticated Key Agreement Protocol on ECC

J Tang, X Wang - CS & IT Conference Proceedings, 2023 - csitcp.com
Key negotiation can establish a shared key between two or even multiple parties in a public
network environment, ensuring communication confidentiality and integrity. Certificateless …