Design of secure mutual authentication scheme for metaverse environments using blockchain

J Ryu, S Son, J Lee, Y Park, Y Park - Ieee Access, 2022 - ieeexplore.ieee.org
During the COVID-19 pandemic, engagement in various remote activities such as online
education and meetings has increased. However, since the conventional online …

PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks

J Zhang, J Cui, H Zhong, Z Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Existing security and identity-based vehicular communication protocols used in Vehicular Ad-
hoc Networks (VANETs) to achieve conditional privacy-preserving mostly rely on an ideal …

Provably secure and lightweight certificateless signature scheme for IIoT environments

A Karati, SKH Islam, M Karuppiah - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In recent years, two technologies, the cloud computing and the Internet of Things (IoT), have
a synergistic effect in the modern organizations as digitization is a new business trend for …

A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs

SKH Islam, MS Obaidat, P Vijayakumar… - Future Generation …, 2018 - Elsevier
With the rapid growth of information and communication technology (ICT) and Internet of
things (IoT), the concept of smart-city is recently introduced by the government of many …

An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system

P Soni, AK Pal, SKH Islam - Computer methods and programs in …, 2019 - Elsevier
Background and objective: Wireless sensor network-based remote health-care systems are
becoming popular day by day with the rapid growth of Internet technologies and the …

Privacy-preserved, provable secure, mutually authenticated key agreement protocol for healthcare in a smart city environment

S Khatoon, SMM Rahman, M Alrubaian… - IEEE access, 2019 - ieeexplore.ieee.org
Smart home systems can provide health care services for people with special needs in their
own homes. Briefly defined, such a smart home has special electronics to enable the remote …

A secure three-factor user authentication and key agreement protocol for tmis with user anonymity

R Amin, GP Biswas - Journal of medical systems, 2015 - Springer
Telecare medical information system (TMIS) makes an efficient and convenient connection
between patient (s)/user (s) and doctor (s) over the insecure internet. Therefore, data …

HCPA-GKA: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs

J Cui, X Tao, J Zhang, Y Xu, H Zhong - Vehicular communications, 2018 - Elsevier
In recent years, the continuous economic development and the emergence of new
technologies have made vehicles an indispensable travel tool in people's lives. However …

A pairing-free and provably secure certificateless signature scheme

A Karati, SKH Islam, GP Biswas - Information Sciences, 2018 - Elsevier
Certificateless Signature (CLS) scheme is a notable cryptographic technique for solving the
key escrow problem in identity-based cryptosystem (IBC). In the CLS, the private key is …

Cryptanalysis and improvement of authentication and key agreement protocols for telecare medicine information systems

SH Islam, MK Khan - Journal of medical systems, 2014 - Springer
Recently, many authentication protocols have been presented using smartcard for the
telecare medicine information system (TMIS). In 2014, Xu et al. put forward a two-factor …