Elliptic curve lightweight cryptography: A survey

CA Lara-Nino, A Diaz-Perez… - IEEE Access, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …

[PDF][PDF] Secure remote user authentication scheme on health care, IoT and cloud applications: a multilayer systematic survey

V Rajasekar, J Premalatha, K Sathya… - Acta Polytechnica …, 2021 - epa.niif.hu
Secure remote user authentication is an authentication technique in which the remote server
authorizes the identity of the user through an insecure communication network. Since then …

An Offline Direct Authentication Scheme for the Internet of Medical Things based on Elliptic Curve Cryptography

A Maarouf, R Sakr, S Elmougy - IEEE Access, 2024 - ieeexplore.ieee.org
Nowadays, we face improvements in the field of the Internet of Things (IoT). The primary
focus of the Internet of Medical Things (IoMT) is to gather health data from patients and …

A quadratic residue-based RFID authentication protocol with enhanced security for TMIS

Z Zhou, P Wang, Z Li - Journal of ambient intelligence and humanized …, 2019 - Springer
Telecare medicine information system (TMIS) is one of most important RFID applications in
the healthcare field. Li et al. proposed a RFID tag authentication protocol with privacy …

Modelling the map reduce based optimal gradient boosted tree classification algorithm for diabetes mellitus diagnosis system

RT Selvi, I Muthulakshmi - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
In recent days, the term big data become popular and refers to data heterogeneity and
massive quantity which gets updated and multiplied in every fraction of second. This paper …

On the designing a secure biometric-based remote patient authentication scheme for mobile healthcare environments

M Adeli, N Bagheri, HR Meimani - Journal of Ambient Intelligence and …, 2021 - Springer
Internet of medical things (IoMT) is bringing many opportunities for healthcare and our
personal lives. For example, using this technology a healthcare provider can remotely …

Intelligent and assisted medicine dispensing machine for elderly visual impaired people with deep neural network fingerprint authentication system

S Sivakumar, SS Sridhar, R Rajalakshmi… - Internet of Things, 2023 - Elsevier
Offering a medication to Elderly and Visually Impaired People (EVIP) in rural areas without
staff assistance is a difficult task in the field of health care. The current pill dispenser has …

An enhanced smart card and dynamic ID based remote multi-server user authentication scheme

N Andola, S Prakash, R Gahlot, S Venkatesan… - Cluster …, 2022 - Springer
Organizations often use smart card-based user authentication for remote access. The
research community has put forward dynamic identity based remote user authentication …

Hybrid-AI-Based iBeacon Indoor Positioning Cybersecurity: Attacks and Defenses

CJ Huang, CJ Chi, WT Hung - Sensors, 2023 - mdpi.com
iBeacon systems have been increasingly established in public areas to assist users in terms
of indoor location navigation and positioning. People receive the services through the …

Design of inter-BAN authentication protocols for WBAN in a cloud-assisted environment

AM Almuhaideb, HA Alghamdi - Big Data and Cognitive Computing, 2022 - mdpi.com
The Telecare Medical Information System (TMIS) is a technology used in Wireless Body
Area Networks (WBAN) that is used efficiently for remote healthcare services. TMIS services …