Lmas-shs: A lightweight mutual authentication scheme for smart home surveillance

SU Jan, IA Abbasi, MA Alqarni - IEEE Access, 2022 - ieeexplore.ieee.org
The network-enabled smart objects are evolving everywhere in the modern era to solve
numerous problems like real-world data collection from the environment, communication …

Information Security: A Coordinated Strategy to Guarantee Data Security in Cloud Computing

KI Jones, R Suchithra - International Journal of Data Informatics and …, 2023 - ijdiic.com
This paper discusses different techniques and specialized procedures which can be used to
effectively protect data from the owner to the cloud and then to the user. The next step …

[PDF][PDF] A Secure and Efficient Information Authentication Scheme for E-Healthcare System.

N Khan, J Zhang, GA Mallah… - Computers, Materials & …, 2023 - researchgate.net
The mobile cellular network provides internet connectivity for heterogeneous Internet of
Things (IoT) devices. The cellular network consists of several towers installed at appropriate …

An ECC-based mutual data access control protocol for next-generation public cloud

N Khan, Z Jianbiao, H Lim, J Ali, I Ullah… - Journal of Cloud …, 2023 - Springer
Through the broad usage of cloud computing and the extensive utilization of next-generation
public clouds, people can share valuable information worldwide via a wireless medium …

[Retracted] A Provable Secure Cross‐Verification Scheme for IoT Using Public Cloud Computing

N Khan, J Zhang, J Ali, MS Pathan… - Security and …, 2022 - Wiley Online Library
Public cloud computing has become increasingly popular due to the rapid advancements in
communication and networking technology. As a result, it is widely used by businesses …

Attribute based pseudonyms: Anonymous and linkable scoped credentials

F Garcia-Grau, J Herrera-Joancomartí, A Dorca Josa - Mathematics, 2022 - mdpi.com
Attribute-based credentials (ABCs) provide an efficient way to transfer custody of personal
and private data to the final user, while minimizing the risk of sensitive data revelation and …

[PDF][PDF] Lattice-based authentication scheme to prevent quantum attack in public cloud environment

ZJN Khan, I Ullah, MS Pathan, H Lim - Comput Mater Continua, 2023 - cdn.techscience.cn
Public cloud computing provides a variety of services to consumers via high-speed internet.
The consumer can access these services anytime and anywhere on a balanced service …

AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments

FM Salem, M Safwat, R Fathy, S Habashy - Journal of Cloud Computing, 2023 - Springer
The rapid growth of Internet users was the motivation of the emerge appearance of new
computing models such as cloud computing, fog computing and edge computing. For this …

Deterministic Hash and Linear Congruential BlowFish Extreme Learning for User Authentication in Cloud Computing

S Radha, S Jeyalaksshmi - SN Computer Science, 2023 - Springer
Abstract Advanced technology of Cloud Computing (CC) is to provide the services without
straight executive of users and demand for resources. It is very scalable and vigorous as …

Efficient and Revocable Anonymous Account Guarantee System Based on Blockchain

W Liang, Y Wang, Y Ding, H Liang, C Yang… - International Conference …, 2023 - Springer
The fast expansion of information technology and public concern for personal privacy and
security have raised expectations for the authentication process. Although existing …