A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing

Y Zhang, L Xiong, F Li, X Niu, H Wu - Journal of Systems Architecture, 2023 - Elsevier
Blockchain-based authentication mode, a fundamental solution to prevent unauthorized
access behavior, gradually becomes a focus in future distributed mobile cloud computing …

A secure three-factor authentication protocol for e-governance system based on multiserver environments

Y Cho, J Oh, D Kwon, S Son, S Yu, Y Park… - IEEE Access, 2022 - ieeexplore.ieee.org
In electronic governance (e-governance) system, citizens can access government services
such as transportation, licensing and immigration remotely over the Internet. With the …

A blockchain-based authentication and authorization scheme for distributed mobile cloud computing services

L Yu, M He, H Liang, L Xiong, Y Liu - Sensors, 2023 - mdpi.com
Authentication and authorization constitute the essential security component, access control,
for preventing unauthorized access to cloud services in mobile cloud computing (MCC) …

Research on improvement of DPoS consensus mechanism in collaborative governance of network public opinion

Y Chen, F Liu - Peer-to-peer Networking and Applications, 2022 - Springer
With the increasingly complex social situation, the problems of traditional online public
opinion governance are increasingly serious. Especially the problem of transmission …

Artificial lizard search optimized fuzzy logic approach to addressing authentication and data security challenges in P2P cloud environments

BJ Chelliah - Computers & Security, 2023 - Elsevier
The cloud is a widely used technology for inter-organizational data exchange and managing
digital information. Even though it offers significant potential for user convenience it is …

A blockchain-assisted lightweight anonymous authentication scheme for medical services in internet of medical things

S Wu, A Zhang, J Chen, G Peng, Y Gao - Wireless Personal …, 2023 - Springer
Internet of medical things (IoMT) enable physicians to provide precise care on the Internet
for registered patients anywhere, bringing convenience to people's everyday life …

A Robust and Effective Two-Factor Authentication (2FA) Protocol Based on ECC for Mobile Computing

K Liu, Z Zhou, Q Cao, G Xu, C Wang, Y Gao, W Zeng… - Applied Sciences, 2023 - mdpi.com
The rapid development of mobile computing (eg, mobile health, mobile payments, and smart
homes) has brought great convenience to our lives. It is well-known that the security and …

[PDF][PDF] Design of Hybrid Metaheuristic Optimization Algorithm for Trust-Aware Privacy Preservation in Cloud Computing

H Saini, G Singh, M Rohil - International Journal of Computer …, 2023 - mail.ijcna.org
The growing relevance of trust and privacy preservation in cloud computing environments
stems from the need to preserve sensitive data, comply with regulations, and maintain user …

4F-MAKA: Four-factor mutual authentication and key agreement protocol for internet of things

D Rangwani, H Om - Peer-to-Peer Networking and Applications, 2023 - Springer
Abstract The Internet of Things (IoT), a popular technology that has revolutionized the
concept of smart gadgets by bringing the world together, uses the Internet to connect the …

Privacy-preserving cloud-based secure digital locker with differential privacy-based deep learning technique

P Shanthi, S Vidivelli, P Padmakumari - Multimedia Tools and Applications, 2024 - Springer
Practically in this modern era, data privacy preservation is somewhat a complex technique
due to the development of advanced technologies. During user interaction, the …