Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective

UPD Ani, H He, A Tiwari - Journal of Cyber Security Technology, 2017 - Taylor & Francis
Nowadays, the industrial sector is being challenged by several cybersecurity concerns.
Direct attacks by malicious persons and (or) software form part of the severe jeopardies of …

Efficient privacy-aware authentication scheme for mobile cloud computing services

D He, N Kumar, MK Khan, L Wang… - IEEE Systems …, 2016 - ieeexplore.ieee.org
With the exponential increase of the mobile devices and the fast development of cloud
computing, a new computing paradigm called mobile cloud computing (MCC) is put forward …

An improved and provably secure privacy preserving authentication protocol for SIP

SA Chaudhry, H Naqvi, M Sher, MS Farash… - Peer-to-Peer Networking …, 2017 - Springer
Abstract Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any
multimedia based application or IP-based telephony service that requires signaling. SIP …

An improved anonymous authentication scheme for telecare medical information systems

F Wen, D Guo - Journal of medical systems, 2014 - Springer
Telecare medical information system (TMIS) constructs an efficient and convenient
connection between patients and the medical server. The patients can enjoy medical …

A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography

SA Chaudhry, MS Farash, H Naqvi, M Sher - Electronic Commerce …, 2016 - Springer
The use of e-payment system for electronic trade is on its way to make daily life more easy
and convenient. Contrarily, there are a number of security issues to be addressed, user …

An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC

H Arshad, M Nikooghadam - Multimedia Tools and Applications, 2016 - Springer
The session initiation protocol (SIP) is a powerful and superior signaling protocol for the
voice over internet protocol (VoIP). Authentication is an important security requirement for …

Real time MODBUS transmissions and cryptography security designs and enhancements of protocol sensitive information

A Shahzad, M Lee, YK Lee, S Kim, N Xiong, JY Choi… - Symmetry, 2015 - mdpi.com
Information technology (IT) security has become a major concern due to the growing
demand for information and massive development of client/server applications for various …

An improved smart card based authentication scheme for session initiation protocol

S Kumari, SA Chaudhry, F Wu, X Li, MS Farash… - Peer-to-Peer Networking …, 2017 - Springer
Sessioninitiation protocol (SIP) reformed the controlling routine of voice over Internet
Protocol based communication over public channels. SIP is inherently insecure because of …

An enhanced privacy preserving remote user authentication scheme with provable security

SA Chaudhry, MS Farash, H Naqvi… - Security and …, 2015 - Wiley Online Library
Very recently, Kumari et al. proposed a symmetric key and smart card‐based remote user
password authentication scheme to enhance Chung et al.'s scheme. They claimed their …

A lightweight anonymous authentication scheme for consumer roaming in ubiquitous networks with provable security

MS Farash, SA Chaudhry, M Heydari… - International Journal …, 2017 - Wiley Online Library
Ubiquitous networks provide roaming service for mobile nodes enabling them to use the
services extended by their home networks in a foreign network. A mutual authentication …