Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions

S Ahmad, I Shakeel, S Mehfuz, J Ahmad - Computer Science Review, 2023 - Elsevier
In recent times, the machine learning (ML) community has recognized the deep learning
(DL) computing model as the Gold Standard. DL has gradually become the most widely …

An overview of cloud‐fog computing: Architectures, applications with security challenges

S Kunal, A Saha, R Amin - Security and Privacy, 2019 - Wiley Online Library
With the growing needs of data across the world, it almost hard to live without data a day.
This is almost a blessing in disguise for the researchers working on different domains and …

A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions

S Yu, Y Park - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Wireless medical sensor networks (WMSNs)-based medical systems are an emerging
paradigm of the Internet of Medical Things (IoMT) in which the patients and doctors can …

A robust and anonymous patient monitoring system using wireless medical sensor networks

R Amin, SKH Islam, GP Biswas, MK Khan… - Future Generation …, 2018 - Elsevier
In wireless medical sensor network (WMSN), bio-sensors are implanted within the patient
body to sense the sensitive information of a patient which later on can be transmitted to the …

A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks

R Amin, GP Biswas - Ad Hoc Networks, 2016 - Elsevier
Wireless sensor networks can be deployed in any attended or unattended environments like
environmental monitoring, agriculture, military, health care etc., where the sensor nodes …

Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks

R Amin, SKH Islam, GP Biswas, MK Khan, L Leng… - Computer Networks, 2016 - Elsevier
Recently, Farash et al. pointed out some security weaknesses of Turkanović et al.'s protocol,
which they extended to enhance its security. However, we found some problems with Farash …

A lightweight user authentication scheme for cloud-IoT based healthcare services

G Sharma, S Kalra - Iranian Journal of Science and Technology …, 2019 - Springer
With the ongoing revolution of cloud computing and Internet of Things, remote patient
monitoring has become feasible. These networking paradigms are widely used to provide …

ECC based inter-device authentication and authorization scheme using MQTT for IoT networks

A Lohachab - Journal of Information Security and Applications, 2019 - Elsevier
Abstract Internet of Things (IoT) has emerged from the proliferation of smart and inter-
connected devices ranging from tiny sensors to complex Fog and Cloud nodes, various …

An improved and provably secure privacy preserving authentication protocol for SIP

SA Chaudhry, H Naqvi, M Sher, MS Farash… - Peer-to-Peer Networking …, 2017 - Springer
Abstract Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any
multimedia based application or IP-based telephony service that requires signaling. SIP …

Machine learning and smart card based two-factor authentication scheme for preserving anonymity in telecare medical information system (TMIS)

BB Gupta, V Prajapati, N Nedjah, P Vijayakumar… - Neural Computing and …, 2023 - Springer
Telecare medical information system (TMIS) is used to connect patients and doctors who are
at a different location from each other. The authentication of the user and system is very …