Programming challenges of chatbot: Current and future prospective

AM Rahman, A Al Mamun… - 2017 IEEE region 10 …, 2017 - ieeexplore.ieee.org
In the modern Era of technology, Chatbots is the next big thing in the era of conversational
services. Chatbots is a virtual person who can effectively talk to any human being using …

[HTML][HTML] A three-factor anonymous user authentication scheme for Internet of Things environments

H Lee, D Kang, J Ryu, D Won, H Kim, Y Lee - Journal of Information …, 2020 - Elsevier
To accelerate the deployment of fifth-generation (5G) cellular networks, millions of devices
are being connected to massive Internet of Things (IoT) networks. However, advances in the …

[PDF][PDF] Secure remote user authentication scheme on health care, IoT and cloud applications: a multilayer systematic survey

V Rajasekar, J Premalatha, K Sathya… - Acta Polytechnica …, 2021 - epa.niif.hu
Secure remote user authentication is an authentication technique in which the remote server
authorizes the identity of the user through an insecure communication network. Since then …

Mobile-Chain: Secure blockchain based decentralized authentication system for global roaming in mobility networks

M Indushree, M Raj, VK Mishra, R Shashidhara… - Computer …, 2023 - Elsevier
Designing a secure and efficient authentication protocol is crucial and challenging in the
mobility network. Due to the seamless roaming of mobile users over multiple foreign agents …

Design of an anonymity-preserving group formation based authentication protocol in global mobility networks

S Banerjee, V Odelu, AK Das, S Chattopadhyay… - IEEE …, 2018 - ieeexplore.ieee.org
Remote user authentication without compromising user anonymity is an emerging area in
the last few years. In this paper, we propose a new anonymity preserving mobile user …

A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things

M Naeem, SA Chaudhry, K Mahmood… - International Journal …, 2020 - Wiley Online Library
Very recently, Alamr et al (J. Supercomput 1‐14 doi: 10.1007/s11227‐016‐1861‐1)
presented a radio frequency identifier (RFID) authentication protocol for the Internet of …

[Retracted] Dependable and Provable Secure Two‐Factor Mutual Authentication Scheme Using ECC for IoT‐Based Telecare Medical Information System

N Radhakrishnan, AP Muniyandi - Journal of Healthcare …, 2022 - Wiley Online Library
With the recent tremendous growth in technology, the Internet of Things (IoT) Telecare
Medicine Information System (TMIS) is the most widely used medical information system …

Secure and anonymous authentication scheme for mobile edge computing environments

H Lee, J Ryu, D Won - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is progressively being integrated into everyday life, with cloud
computing systems being widely employed to monitor and manage IoT devices. Cloud …

Bio-inspired cryptosystem with DNA cryptography and neural networks

S Basu, M Karuppiah, M Nasipuri, AK Halder… - Journal of Systems …, 2019 - Elsevier
Abstract Bio-Inspired Cryptosystems are a modern form of Cryptography where bio-inspired
and machine learning techniques are used for the purpose of securing data. A system has …

A robust user authentication protocol with privacy-preserving for roaming service in mobility environments

R Shashidhara, S Bojjagani, AK Maurya… - Peer-to-peer networking …, 2020 - Springer
The authentication system plays a crucial role in the context of GLObal MObility NETwork
(GLOMONET) where Mobile User (MU) often need to seamless and secure roaming service …