Medical image encryption by content-aware DNA computing for secure healthcare

Y Wu, L Zhang, S Berretti, S Wan - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
There exists a rising concern on security of healthcare data and service. Even small lost,
stolen, displaced, hacked, or communicated in personal health data could bring huge …

Understanding failures in security proofs of multi-factor authentication for mobile devices

Q Wang, D Wang - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
Multi-factor authentication is a promising way to enhance the security of password-based
authenticated key exchange (PAKE) schemes. It is widely deployed in various daily …

A continuous authentication protocol without trust authority for zero trust architecture

L Meng, D Huang, J An, X Zhou, F Lin - China Communications, 2022 - ieeexplore.ieee.org
Zero-trust security is a novel concept to cope with intricate access, which can not be handled
by the conventional perimeter-based architecture anymore. The device-to-device continuous …

Cybersecurity attack-resilience authentication mechanism for intelligent healthcare system

P Soni, J Pradhan, AK Pal… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
People focus on the intelligent healthcare system expecting sufficient medical facilities even
from a remote location. However, to make the healthcare system more trustworthy, secure …

Ensuring academic integrity and trust in online learning environments: A longitudinal study of an ai-centered proctoring system in tertiary educational institutions

CA Fidas, M Belk, A Constantinides, D Portugal… - Education …, 2023 - mdpi.com
The credibility of online examinations in Higher Education is hardened by numerous factors
and use-case scenarios. This paper reports on a longitudinal study, that spanned over …

ZITA: Zero-Interaction Two-Factor Authentication using Contact Traces and In-band Proximity Verification

N Ghose, K Gupta, L Lazos, M Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Two-factor authentication (TFA) provides an additional layer of protection to commonly-
occurring password breaches. However, existing TFA methods, often involve special …

QAKA: A novel quantum authentication and key agreement (QAKA) protocol using quantum entanglement for secure communication among IoT devices

D Chawla, PS Mehra - Transactions on Emerging …, 2024 - Wiley Online Library
The constant evolution of the Internet of Things (IoT) concept involves the idea that all
elements in the global network communication are reachable without the need for human …