[HTML][HTML] Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review

SA Sheik, AP Muniyandi - Cyber Security and Applications, 2023 - Elsevier
The fast growth of the cloud computing technology has led to immense development in the
public and private sectors. Cloud computing provides a high level of virtualization, massive …

An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks

F Wu, L Xu, S Kumari, X Li - Multimedia Systems, 2017 - Springer
Wireless sensor networks (WSNs) are fast developed and widely used in many applications.
One of the most important applications is wireless medical sensor network (WMSN) which …

Improved ECC‐based three‐factor multiserver authentication scheme

TY Wu, L Yang, Z Lee, CM Chen… - Security and …, 2021 - Wiley Online Library
A multiserver environment can improve the efficiency of mobile network services more
effectively than a single server in managing the increase in users. Because of the large …

Remote user authentication scheme using smart card: a review

M Karuppiah - International Journal of Internet Protocol …, 2016 - inderscienceonline.com
User authentication is the process of verifying the legitimacy of a user. Until now, several
authentication schemes using smart card proposed in the literature and each proposed …

ESEAP: ECC based secure and efficient mutual authentication protocol using smart card

A Kumari, S Jangirala, MY Abbasi, V Kumar… - Journal of Information …, 2020 - Elsevier
Smart card based user server mutual authentication framework is famous for safe
communication via unfavorable and insecure communication system. The authenticated …

Public key versus symmetric key cryptography in client–server authentication protocols

A Braeken - International Journal of Information Security, 2022 - Springer
Every month, several new protocols are popping up, comparing themselves with a few
others and claiming to outperform the whole state of the art. The most popular domain of …

A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things

M Naeem, SA Chaudhry, K Mahmood… - International Journal …, 2020 - Wiley Online Library
Very recently, Alamr et al (J. Supercomput 1‐14 doi: 10.1007/s11227‐016‐1861‐1)
presented a radio frequency identifier (RFID) authentication protocol for the Internet of …

A secure authentication scheme with user anonymity for roaming service in global mobility networks

M Karuppiah, R Saravanan - Wireless Personal Communications, 2015 - Springer
In global mobility networks, user authentication is an essential security mechanism that
permits mobile users to use the roaming services offered by foreign agents with the support …

Bio-inspired cryptosystem with DNA cryptography and neural networks

S Basu, M Karuppiah, M Nasipuri, AK Halder… - Journal of Systems …, 2019 - Elsevier
Abstract Bio-Inspired Cryptosystems are a modern form of Cryptography where bio-inspired
and machine learning techniques are used for the purpose of securing data. A system has …

Secure remote user mutual authentication scheme with key agreement for cloud environment

M Karuppiah, AK Das, X Li, S Kumari, F Wu… - Mobile Networks and …, 2019 - Springer
Authentication schemes are widely used mechanisms to thwart unauthorized access of
resources over insecure networks. Several smart card based password authentication …