Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    A Secure Multi-factor Authentication Protocol for Healthcare Services Using Cloud-based SDN

    Sugandhi Midha1, Sahil Verma1,*, Kavita1, Mohit Mittal2, Nz Jhanjhi3,4, Mehedi Masud5, Mohammed A. AlZain6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3711-3726, 2023, DOI:10.32604/cmc.2023.027992

    Abstract Cloud-based SDN (Software Defined Network) integration offers new kinds of agility, flexibility, automation, and speed in the network. Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application requirement. The integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care services. It has improved the real-time monitoring of patients by medical practitioners. Patients’ data get stored at the central server on the cloud from where it is available to medical practitioners in no time. The centralisation of data on the server makes it more vulnerable… More >

  • Open Access

    ARTICLE

    A Multi-Stage Secure IoT Authentication Protocol

    Khalid Alhusayni1, Raniyah Wazirali1, Mousa AlAkhras1,2, Marwah Almasri1,*, Samah Alhazmi1

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 459-481, 2023, DOI:10.32604/csse.2023.028536

    Abstract The Internet of Things (IoT) is a network of heterogeneous and smart devices that can make decisions without human intervention. It can connect millions of devices across the universe. Their ability to collect information, perform analysis, and even come to meaningful conclusions without human capital intervention matters. Such circumstances require stringent security measures and, in particular, the extent of authentication. Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious, wrongly authenticated device finds its way into the IoT system. This research provides a clear and updated view of the trends in… More >

  • Open Access

    ARTICLE

    Security Analysis for a VANET Privacy Protection Scheme

    Yuzhen Liu1,2, Xiaoliang Wang1,2,*, Zhoulei Cao1,2, Frank Jiang3

    Journal of Cyber Security, Vol.4, No.1, pp. 57-64, 2022, DOI:10.32604/jcs.2022.028792

    Abstract Vehicular ad hoc network (VANET) is a self-organizing wireless sensor network model, which is extensively used in the existing traffic. Due to the openness of wireless channel and the sensitivity of traffic information, data transmission process in VANET is vulnerable to leakage and attack. Authentication of vehicle identity while protecting vehicle privacy information is an advantageous way to improve the security of VANET. We propose a scheme based on fair blind signature and secret sharing algorithm. In this paper, we prove that the scheme is feasible through security analysis. More >

  • Open Access

    ARTICLE

    Secure and Anonymous Three-Factor Authentication Scheme for Remote Healthcare Systems

    Munayfah Alanazi*, Shadi Nashwan

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 703-725, 2022, DOI:10.32604/csse.2022.022962

    Abstract Wireless medical sensor networks (WMSNs) play a significant role in increasing the availability of remote healthcare systems. The vital and physiological data of the patient can be collected using the WMSN via sensor nodes that are placed on his/her body and then transmitted remotely to a healthcare professional for proper diagnosis. The protection of the patient’s privacy and their data from unauthorized access is a major concern in such systems. Therefore, an authentication scheme with a high level of security is one of the most effective mechanisms by which to address these security concerns. Many authentication schemes for remote patient… More >

  • Open Access

    ARTICLE

    Fully Authentication Services Scheme for NFC Mobile Payment Systems

    Munefah Alshammari*, Shadi Nashwan

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 401-428, 2022, DOI:10.32604/iasc.2022.022065

    Abstract One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adversary can access, block and modify the transmitted messages to achieve illegal goals. Therefore, there have been many research proposals in regards to authentication schemes for NFC communications in order to prevent… More >

Displaying 1-10 on page 1 of 5. Per Page