4.2 Article

New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Intelligent Monitoring System for Biogas Detection Based on the Internet of Things: Mohammedia, Morocco City Landfill Case

Jamal Mabrouki et al.

Summary: Mechanization of organic waste treatment is a depollution activity that reduces gas pollution by burning and biogas production. This study analyzes the composition of emitted biogas in different seasons to understand their influence on landfill emissions.

BIG DATA MINING AND ANALYTICS (2021)

Article Computer Science, Artificial Intelligence

IoT-Based Data Logger for Weather Monitoring Using Arduino-Based Wireless Sensor Networks with Remote Graphical Application and Alerts

Jamal Mabrouki et al.

Summary: The paper introduces an automatic weather monitoring system based on IoT and embedded technology, which can collect real-time climate data of a specific area by sensing parameters like temperature, humidity, and gases with sensors, transmitting the data to remote applications or databases for storage and visualization in graphical and tabular forms.

BIG DATA MINING AND ANALYTICS (2021)

Article Computer Science, Artificial Intelligence

New Enhanced Authentication Protocol for Internet of Things

Mourade Azrour et al.

Summary: Internet of Things (IoT) is a new extended network that connects any object to the Internet for data exchange and remote control. Despite its advantages in multiple areas, ensuring security of user data remains a central concern, making authentication and key exchange protocols crucial. Ye et al. proposed a protocol in 2012, but it was found to be vulnerable to attacks, leading to the need for enhanced authentication protocols like the one proposed in this paper.

BIG DATA MINING AND ANALYTICS (2021)

Article Engineering, Electrical & Electronic

A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT

Bander A. Alzahrani et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2020)

Article Computer Science, Information Systems

Smart healthcare monitoring: a voice pathology detection paradigm for smart cities

M. Shamim Hossain et al.

MULTIMEDIA SYSTEMS (2019)

Article Engineering, Electrical & Electronic

A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services

Geeta Sharma et al.

IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING (2019)

Proceedings Paper Computer Science, Artificial Intelligence

IoT Based Real-time River Water Quality Monitoring System

Mohammad Salah Uddin Chowdury et al.

16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (2019)

Article Computer Science, Theory & Methods

A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment

Ruhul Amin et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity

Xiong Li et al.

SECURITY AND COMMUNICATION NETWORKS (2016)

Article Computer Science, Theory & Methods

The random oracle model: a twenty-year retrospective

Neal Koblitz et al.

DESIGNS CODES AND CRYPTOGRAPHY (2015)

Article Engineering, Electrical & Electronic

Improvement of robust smart-card-based password authentication scheme

Qi Jiang et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2015)

Article Computer Science, Information Systems

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

Debiao He et al.

MULTIMEDIA SYSTEMS (2015)

Article Health Care Sciences & Services

A User Anonymity Preserving Three-Factor Authentication Scheme for Telecare Medicine Information Systems

Zuowen Tan

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems

Dheerendra Mishra et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce

Dheerendra Mishra et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Mathematics, Applied

An Efficient Authentication and Access Control Scheme for Perception Layer of Internet of Things

Ning Ye et al.

APPLIED MATHEMATICS & INFORMATION SCIENCES (2014)

Article Health Care Sciences & Services

A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems

Xiaopeng Yan et al.

JOURNAL OF MEDICAL SYSTEMS (2013)

Article Chemistry, Analytical

Advanced Biometric-Based User Authentication Scheme for Wireless Sensor Networks

Eun-Jun Yoon et al.

SENSOR LETTERS (2013)

Article Computer Science, Information Systems

ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks

Daojing He et al.

IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE (2012)

Article Computer Science, Hardware & Architecture

Advanced smart card based password authentication protocol

Ronggong Song

COMPUTER STANDARDS & INTERFACES (2010)

Article Computer Science, Hardware & Architecture

An improved smart card based password authentication scheme with provable security

Jing Xu et al.

COMPUTER STANDARDS & INTERFACES (2009)