[HTML][HTML] Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review

SA Sheik, AP Muniyandi - Cyber Security and Applications, 2023 - Elsevier
The fast growth of the cloud computing technology has led to immense development in the
public and private sectors. Cloud computing provides a high level of virtualization, massive …

Remote user authentication scheme using smart card: a review

M Karuppiah - International Journal of Internet Protocol …, 2016 - inderscienceonline.com
User authentication is the process of verifying the legitimacy of a user. Until now, several
authentication schemes using smart card proposed in the literature and each proposed …

[Retracted] Dependable and Provable Secure Two‐Factor Mutual Authentication Scheme Using ECC for IoT‐Based Telecare Medical Information System

N Radhakrishnan, AP Muniyandi - Journal of Healthcare …, 2022 - Wiley Online Library
With the recent tremendous growth in technology, the Internet of Things (IoT) Telecare
Medicine Information System (TMIS) is the most widely used medical information system …

Bio-inspired cryptosystem with DNA cryptography and neural networks

S Basu, M Karuppiah, M Nasipuri, AK Halder… - Journal of Systems …, 2019 - Elsevier
Abstract Bio-Inspired Cryptosystems are a modern form of Cryptography where bio-inspired
and machine learning techniques are used for the purpose of securing data. A system has …

Secure remote user mutual authentication scheme with key agreement for cloud environment

M Karuppiah, AK Das, X Li, S Kumari, F Wu… - Mobile Networks and …, 2019 - Springer
Authentication schemes are widely used mechanisms to thwart unauthorized access of
resources over insecure networks. Several smart card based password authentication …

A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks

M Karuppiah, S Kumari, X Li, F Wu, AK Das… - Wireless Personal …, 2017 - Springer
User authentication scheme is an essential issue for offering roaming service to mobile
users in global mobile network (GLOMONET). However, designing an anonymous user …

Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography

S Kumari, M Karuppiah, AK Das, X Li, F Wu… - Journal of Ambient …, 2018 - Springer
The session initiation protocol (SIP) is a signaling protocol which is used to controlling
communication in the Internet. It is also used for initiating, terminating and maintaining the …

A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks

M Karuppiah, S Kumari, AK Das, X Li… - Security and …, 2016 - Wiley Online Library
Ubiquitous networks provide effective roaming services for mobile users (MUs). Through the
worldwide roaming technology, authorized MUs can avail ubiquitous network services …

A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme

A Chaturvedi, D Mishra, S Jangirala… - Journal of Information …, 2017 - Elsevier
Abstract Advancement in Internet of Things (IOT) and remote user communication is
facilitated, where a user need not be physically present. However, security and privacy …

A new SmartSMS protocol for secure SMS communication in m-health environment

P Vijayakumar, SM Ganesh, LJ Deborah… - Computers & Electrical …, 2018 - Elsevier
In the present m-health scenario, a patient and a doctor may engage in an SMS
conversation regarding the sensitive medical information about the body of a patient and the …