RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing

V Kumar, M Ahmad, D Mishra, S Kumari… - Vehicular …, 2020 - Elsevier
Vehicular cloud computing (VCC) is an emerging research area, which comprises cloud,
vehicular networking and Internet of Things (IoT) technologies. VCC presents vehicle-to …

Csef: cloud-based secure and efficient framework for smart medical system using ecc

A Kumari, V Kumar, MY Abbasi, S Kumari… - IEEE …, 2020 - ieeexplore.ieee.org
Smart architecture is the concept to manage the facilities via internet utilization in a proper
manner. There are various technologies used in smart architecture such as cloud …

An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing

W Akram, K Mahmood, X Li, M Sadiq, Z Lv… - Computer Networks, 2022 - Elsevier
Abstract Vehicular Cloud Computing (VCC) is a contemporary paradigm that includes the
Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers …

A secure and efficient key agreement framework for critical energy infrastructure using mobile device

AA Khan, V Kumar, M Ahmad, BB Gupta… - Telecommunication …, 2021 - Springer
Abstract Internet of Energy (IoE) provides two-way communication for reform of energy
utilization between service providers and consumers. To provide secure, efficient, and …

[PDF][PDF] RAVCC: robust authentication protocol for RFID based vehicular cloud computing

V Kumar, R Kumar, V Kumar, A Kumari, S Kumari - J. Netw. Intell, 2022 - bit.nkust.edu.tw
Vehicular cloud computing (VCC) stands for vehicle cloud computing, which combines
cloud, vehicular networking, and Internet of Things (IoT) and related technologies. VCC is …

Chaotic-map based authenticated security framework with privacy preservation for remote point-of-care

BD Deebak, F Al-Turjman, A Nayyar - Multimedia Tools and Applications, 2021 - Springer
The challenge of COVID-19 has become more prevalent across the world. It is highly
demanding an intelligent strategy to outline the precaution measures until the clinical trials …

A novel cloud-based IoT framework for secure health monitoring

S Ebadinezhad, TE Mobolade - Sustainability, 2024 - mdpi.com
The growing use of Internet of Things (IoT) technologies in a variety of sectors, including
healthcare, has opened up new possibilities for gathering and analyzing patient data. In …

Two‐factor authentication using biometric based quantum operations

MK Sharma, MJ Nene - Security and Privacy, 2020 - Wiley Online Library
Two‐way authentication methods are utilized in every online user authentication
transactions. Use of one time passwords (OTP) have proved to be more secure method, than …

The Model for Storing Tokens in Local Storage (Cookies) Using JSON Web Token (JWT) with HMAC (Hash-based Message Authentication Code) in E-Learning …

S Dalimunthe, J Reza, A Marzuki - Journal of Applied Engineering and …, 2022 - yrpipku.com
E-learning is a technology that may be used in the learning process to improve not only the
distribution of learning materials but also the ability of learners to modify their abilities of …

SGAK: A Robust ECC based Authenticated Key Exchange Protocol for Smart Grid Networks

AA Khan, V Kumar, R Prasad, MJ Idrisi - IEEE Access, 2024 - ieeexplore.ieee.org
A smart grid (SG), sometimes known as an electric grid, is a very reliable, efficient, as well as
secure method of delivering data on particular participants. Researchers and the power …