Secure key agreement and key protection for mobile device user authentication

L Wu, J Wang, KKR Choo, D He - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As mobile devices ownership becomes more prevalent (eg, a user owns multiple mobile
devices), the capability to offer secure and user friendly authentication becomes increasingly …

An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks

F Wu, L Xu, S Kumari, X Li - Multimedia Systems, 2017 - Springer
Wireless sensor networks (WSNs) are fast developed and widely used in many applications.
One of the most important applications is wireless medical sensor network (WMSN) which …

Remote user authentication scheme using smart card: a review

M Karuppiah - International Journal of Internet Protocol …, 2016 - inderscienceonline.com
User authentication is the process of verifying the legitimacy of a user. Until now, several
authentication schemes using smart card proposed in the literature and each proposed …

Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks

M Indushree, M Raj, VK Mishra, R Shashidhara… - Computer …, 2023 - Elsevier
Designing a secure and efficient authentication protocol is crucial and challenging in the
mobility network. Due to the seamless roaming of mobile users over multiple foreign agents …

Dynamic power management and adaptive packet size selection for IoT in e-Healthcare

X Chen, M Ma, A Liu - Computers & Electrical Engineering, 2018 - Elsevier
Wireless communications in e-healthcare must work in a reliable, fast and energy-efficient
fashion. In this paper, first, a power level decision (PLD) algorithm is proposed to select the …

A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things

M Naeem, SA Chaudhry, K Mahmood… - International Journal …, 2020 - Wiley Online Library
Very recently, Alamr et al (J. Supercomput 1‐14 doi: 10.1007/s11227‐016‐1861‐1)
presented a radio frequency identifier (RFID) authentication protocol for the Internet of …

Secure and efficient two-factor user authentication scheme with user anonymity for network based e-health care applications

X Li, J Niu, M Karuppiah, S Kumari, F Wu - Journal of medical systems, 2016 - Springer
Benefited from the development of network and communication technologies, E-health care
systems and telemedicine have got the fast development. By using the E-health care …

[Retracted] Dependable and Provable Secure Two‐Factor Mutual Authentication Scheme Using ECC for IoT‐Based Telecare Medical Information System

N Radhakrishnan, AP Muniyandi - Journal of Healthcare …, 2022 - Wiley Online Library
With the recent tremendous growth in technology, the Internet of Things (IoT) Telecare
Medicine Information System (TMIS) is the most widely used medical information system …

Bio-inspired cryptosystem with DNA cryptography and neural networks

S Basu, M Karuppiah, M Nasipuri, AK Halder… - Journal of Systems …, 2019 - Elsevier
Abstract Bio-Inspired Cryptosystems are a modern form of Cryptography where bio-inspired
and machine learning techniques are used for the purpose of securing data. A system has …

A robust user authentication protocol with privacy-preserving for roaming service in mobility environments

R Shashidhara, S Bojjagani, AK Maurya… - Peer-to-peer networking …, 2020 - Springer
The authentication system plays a crucial role in the context of GLObal MObility NETwork
(GLOMONET) where Mobile User (MU) often need to seamless and secure roaming service …