Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Card Payment Protocol for Cryptocurrencies with Payment Channel Network
Distributed Ledger Technologies: Research and Practice (DLT), Volume 3, Issue 3Article No.: 19, Pages 1–30https://doi.org/10.1145/3653681Cryptocurrency, despite the upsurge as a speculative investment, is still a long way from being people’s money. The extreme technicality poses a significant barrier for the general public to adopt it as a medium of exchange. Therefore, simplifying the ...
- ArticleMay 2024
FMSYS: Fine-Grained Passenger Flow Monitoring in a Large-Scale Metro System Based on AFC Smart Card Data
Advances in Knowledge Discovery and Data MiningPages 336–349https://doi.org/10.1007/978-981-97-2262-4_27AbstractIn this paper, we investigate the real-time fine-grained passenger flows in a complex metro system. Our primary focus is on addressing crucial questions, such as determining the number of passengers on a moving train and in specific station areas (...
- research-articleJune 2023
A Multifactor Ring Signature based Authentication Scheme for Quality Assessment of IoMT Environment in COVID-19 Scenario
Journal of Data and Information Quality (JDIQ), Volume 15, Issue 2Article No.: 23, Pages 1–24https://doi.org/10.1145/3575811The quality of the healthcare environment has become an essential factor for healthcare users to access quality services. Smart healthcare systems use the Internet of Medical Things (IoMT) devices to capture patients’ health data for treatment or ...
- research-articleJanuary 2023
User anonymity-based secure authentication protocol for telemedical server systems
International Journal of Information and Computer Security (IJICS), Volume 20, Issue 1-2Pages 199–219https://doi.org/10.1504/ijics.2023.128015Telemedical server system enables a user to support the monitoring of health at home and access the medical facility over the network. Recently, many schemes have been proposed for providing security in the medical server system. Recently in year 2017, ...
- research-articleFebruary 2022
A Privacy Preserving Two-Ticket Management System Based on Negative Database for Smart Grid
ACAI '21: Proceedings of the 2021 4th International Conference on Algorithms, Computing and Artificial IntelligenceArticle No.: 49, Pages 1–6https://doi.org/10.1145/3508546.3508595In China, the electric power industry has used the two-ticket system to ensure safety of power production and employees. Currently, the two-ticket system are normally paper based and manually operated, suffering problems such as invalid ticket filling, ...
-
- research-articleJanuary 2021
Robust and provable secure three-factor mutual authentication scheme using a smart card
International Journal of Internet Technology and Secured Transactions (IJITST), Volume 11, Issue 5-6Pages 470–493https://doi.org/10.1504/ijitst.2021.117418The best solution to perform remote authentication verification is offered by the authentication scheme that opts a smart card. Such schemes are developed by using the combination of password and biometric identity. Biometric-based authentication schemes ...
- research-articleJanuary 2021
An efficient and provably secure authentication scheme based on elliptic curve signature using a smart card
International Journal of Information and Computer Security (IJICS), Volume 16, Issue 3-4Pages 207–225https://doi.org/10.1504/ijics.2021.118967Smart card-based authentication schemes play an important role in remote system access and provide a secure method for resource sharing. Over the past two decades, many password-based authentication schemes have been proposed and illustrated by ...
- research-articleJanuary 2020
An enhanced approach for three factor remote user authentication in multi - server environment
- Chintan Patel,
- Dhara Joshi,
- Nishant Doshi,
- A. Veeramuthu,
- Rutvij Jhaveri,
- Vijayakumar Varadarajan,
- Piet Kommers,
- Vincenzo Piuri,
- V. Subramaniyaswamy
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 39, Issue 6Pages 8609–8620https://doi.org/10.3233/JIFS-189177With the agile development of the Internet era, starting from the message transmission to money transactions, everything is online now. Remote user authentication (RUA) is a mechanism in which a remote server verifies the user’s correctness over the ...
- research-articleJanuary 2020
A secure and robust smart card-based remote user authentication scheme
International Journal of Internet Technology and Secured Transactions (IJITST), Volume 10, Issue 3Pages 255–267https://doi.org/10.1504/ijitst.2020.107074In the new era of technology, smart cards play a critical role in economic and social interactions. Security vulnerabilities of these smart cards are the main concern for many users as well as researchers. Authentication has been used as one of the basic ...
- research-articleJanuary 2020
A secure three factor-based fully anonymous user authentication protocol for multi-server environment
International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Volume 34, Issue 1Pages 45–60https://doi.org/10.1504/ijahuc.2020.107506A single sign-on authentication scheme is required protocol in multi-server environment. Recently, an authentication protocol based on Lagrange interpolation polynomial to satisfy multi-server environment with low computational and communication cost is ...
- research-articleApril 2019
A secure authentication with key agreement scheme using ECC for satellite communication systems
International Journal of Satellite Communications and Networking (WSAT), Volume 37, Issue 3Pages 234–244https://doi.org/10.1002/sat.1279SummaryRecently, Liu et al came up with an authentication with key agreement scheme for securing communication over the low‐earth‐orbit satellite communication systems. However, this paper demonstrates that this scheme cannot provide perfect forward ...
This paper demonstrates that Liu et al's scheme cannot provide perfect forward secrecy or defend against the smart card stolen attack, and has some very bad design defects, and then presents a new scheme. The security analyses by the widely used BAN logic ...
- research-articleMarch 2019
A Smart Card Digital Identity Check Model for University Services Access
NISS '19: Proceedings of the 2nd International Conference on Networking, Information Systems & SecurityArticle No.: 67, Pages 1–4https://doi.org/10.1145/3320326.3320401The security of information systems is one of the major problems facing the institutions. The application of a security policy is very essential for the management of the security of information systems. The implementation of a strategy of successful ...
- research-articleJanuary 2018
A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing
Fundamenta Informaticae (FUNI), Volume 157, Issue 1-2Pages 201–220https://doi.org/10.3233/FI-2018-1626Two-factor authenticated key exchange (TFAKE) protocols are critical tools for ensuring identity authentication and secure data transmission for cloud computing. Until now, numerous TFAKE protocols based on smart cards and passwords are proposed under ...
- research-articleSeptember 2017
OpenKeychain: An Architecture for Cryptography with Smart Cards and NFC Rings on Android
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT), Volume 1, Issue 3Article No.: 99, Pages 1–24https://doi.org/10.1145/3130964While many Android apps provide end-to-end encryption, the cryptographic keys are still stored on the device itself and can thus be stolen by exploiting vulnerabilities. External cryptographic hardware solves this issue, but is currently only used for ...
- research-articleSeptember 2017
A secure data backup scheme using multi‐factor authentication
IET Information Security (ISE2), Volume 11, Issue 5Pages 250–255https://doi.org/10.1049/iet-ifs.2016.0103Sensitive data stored in laptops or other mobile devices can easily be lost, stolen, misplaced or corrupted, the remote backup storage technique is used to address these issues; however, the backup server could not be fully trusted, the data should be ...
- research-articleJanuary 2017
Cryptanalysis and improvement of a biometric and smart card based remote user authentication scheme
IMCOM '17: Proceedings of the 11th International Conference on Ubiquitous Information Management and CommunicationArticle No.: 50, Pages 1–8https://doi.org/10.1145/3022227.3022276In recent years, with the increasing amount of internet-connected devices, people tend to access the internet more frequently. User authentication protocol has become one of the most widely used techniques to construct communication between valid users ...
- research-articleJanuary 2017
Cryptanalysis and improvement of robust authentication scheme for telecare medicine information systems
IMCOM '17: Proceedings of the 11th International Conference on Ubiquitous Information Management and CommunicationArticle No.: 18, Pages 1–8https://doi.org/10.1145/3022227.3022244Telecare Medicine Information System holds up health-care delivery service between patients and doctor. Send the user or TMIS server's information through the public channel. To protect patients' personal information such has telephone number, home ...
- research-articleJanuary 2017
Improvement of user authentication scheme preserving uniqueness and anonymity for connected health care
IMCOM '17: Proceedings of the 11th International Conference on Ubiquitous Information Management and CommunicationArticle No.: 11, Pages 1–8https://doi.org/10.1145/3022227.3022237Connected health care is a remotely healthcare system and it provides several services including telecare medicine, personally controlled health record, patient monitoring and so on. Recently, Xu et al. have shown that Xie et al.'s remote user ...
- research-articleNovember 2016
Mobile Gait Match-on-Card Authentication from Acceleration Data with Offline-Simplified Models
MoMM '16: Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi MediaPages 250–260https://doi.org/10.1145/3007120.3007132Biometrics have become important for authentication on mobile devices, e.g. to unlock devices before using them. One way to protect biometric information stored on mobile devices from disclosure is using embedded smart cards (SCs) with biometric match-...
- articleNovember 2016
Security analysis and design of an efficient ECC-based two-factor password authentication scheme
Security and Communication Networks (SACN), Volume 9, Issue 17Pages 4166–4181https://doi.org/10.1002/sec.1596Client-server-based communications provide a facility by which users can get several services from home via the Internet. As the Internet is an insecure channel, it is needed to protect information of communicators. An authentication scheme can fulfill ...