Intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era

BD Deebak, SO Hwang - Computer Networks, 2023 - Elsevier
In the diverse range of surveillance applications, large-scale deployment of next-generation
communication technologies and the fast-growing development of unmanned aerial …

An efficient and provably secure anonymous user authentication and key agreement for mobile cloud computing

J Mo, Z Hu, H Chen, W Shen - Wireless Communications and …, 2019 - Wiley Online Library
Nowadays, due to the rapid development and wide deployment of handheld mobile devices,
the mobile users begin to save their resources, access services, and run applications that …

Efficient provably-secure dynamic ID-based authenticated key agreement scheme with enhanced security provision

D Abbasinezhad-Mood, SM Mazinani… - … on Dependable and …, 2020 - ieeexplore.ieee.org
Providing security and privacy in today's digital era is very crucial. In order to ensure that the
sensitive user data can only be accessed by a valid server, the user and server should …

An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network

L Wu, J Wang, KKR Choo, Y Li, D He - Journal of information security and …, 2017 - Elsevier
Designing an efficient and secure authentication scheme to ensure secure communication
between parties in an ad hoc network remains challenging. Recently in 2017, Shaghayegh …

IAKA-CIOT: An improved authentication and key agreement scheme for cloud enabled internet of things using physical unclonable function

K Park, Y Park - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) with cloud services are important functionalities in the latest IoT
systems for providing various convenient services. These cloud-enabled IoT environments …

Efficient provably-secure privacy-preserving signature-based key establishment protocol

D Abbasinezhad-Mood, A Ostad-Sharif… - Ad Hoc Networks, 2020 - Elsevier
Assuring the security and privacy of users in today's ever-growing digital communications is
of prime significance. In a digital communication, in order to preserve the identities and …

Nomop-ecdsa: a lightweight ecdsa engine for internet of things

X Yang, Y Liu, J Wu, G Han, Y Liu, X Xi - Wireless Personal …, 2021 - Springer
Abstract Internet of Things (IoT) has received attention recently, featuring tremendous
applications. Due to the lack of authentication, popular IoT applications are prone to various …

Identity Authentication Strategy of Mobile Crowd Sensing based on CFL

L Wang, F Li, Y Xie, L Shi - 2022 IEEE 22nd International …, 2022 - ieeexplore.ieee.org
In order to protect information privacy and ensure user information security, in view of the
obvious centralization of the existing identity authentication technologies such as Public Key …

Certificateless authentication protocol for wireless body area network

J Shen, S Chang - Genetic and Evolutionary Computing: Proceedings of …, 2017 - Springer
In order to address the problems of security communication and vital physiological data for
WBANs, in this paper, we propose an effective authentication protocol and secure session …

[PDF][PDF] Strong password authentication and secure user profile tracking in cloud computing environment

E Susmitha - 2020 - gisrrj.com
The world of processing has been changed from two tier to three tier architecture and now
we have become to digital centralization called cloud computing. In service oriented domain …