Secure identity access and data transmission scheme of cloud-assisted intelligent gymnasium DOI Creative Commons
Jiang Li, Chunxiao Mu

Alexandria Engineering Journal, Год журнала: 2024, Номер 115, С. 469 - 478

Опубликована: Дек. 26, 2024

Язык: Английский

Quantum Secure Authentication Scheme for Internet of Medical Things Using Blockchain DOI
Sunil Prajapat, Pankaj Kumar, Dheeraj Kumar

и другие.

IEEE Internet of Things Journal, Год журнала: 2024, Номер 11(23), С. 38496 - 38507

Опубликована: Авг. 22, 2024

Язык: Английский

Процитировано

7

A blockchain-assisted privacy-preserving signature scheme using quantum teleportation for metaverse environment in Web 3.0 DOI
Sunil Prajapat, Garima Thakur, Pankaj Kumar

и другие.

Future Generation Computer Systems, Год журнала: 2024, Номер 164, С. 107581 - 107581

Опубликована: Ноя. 4, 2024

Язык: Английский

Процитировано

4

Designing lattice-enabled group authentication scheme based on post-quantum computing in healthcare applications DOI
Sunil Prajapat, Garima Thakur, Pankaj Kumar

и другие.

Computers & Electrical Engineering, Год журнала: 2025, Номер 123, С. 110028 - 110028

Опубликована: Янв. 4, 2025

Язык: Английский

Процитировано

0

Secure and privacy-preserving quantum authentication scheme using blockchain identifiers in metaverse environment DOI
Sunil Prajapat,

Aryan Rana,

Pankaj Kumar

и другие.

Journal of Systems Architecture, Год журнала: 2025, Номер unknown, С. 103329 - 103329

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

SC-VDTwinAuth: Smart-Contract Assisted Handover Authentication Protocol for Vehicular Digital Twin Network DOI

Deepika Gautam,

Garima Thakur, Sunil Prajapat

и другие.

Vehicular Communications, Год журнала: 2025, Номер 53, С. 100890 - 100890

Опубликована: Янв. 30, 2025

Язык: Английский

Процитировано

0

Construction of Computer Network Security Monitoring Platform Based on Intelligent Sensor Technology DOI Open Access

Guangwen He

Security and Privacy, Год журнала: 2025, Номер 8(2)

Опубликована: Фев. 10, 2025

ABSTRACT As computer networks become ubiquitous, ensuring their security has a critical concern. Existing network monitoring systems still face challenges, including intrusions and data loss. Therefore, the of some confidential information files decreased new type platform inevitably emerges. This paper constructs from aspects architecture design, intelligent sensor selection deployment, server establishment, system maintenance, analyzes fitness function combined with particle swarm optimization algorithm, evaluates resource utilization, storage capacity, other performance in experiment. In experiment, it was found that utilization capacity under sensors have significantly improved. Results demonstrate significant improvements introduction sensors. Specifically, increased by 12% improved 11%, highlighting effectiveness enhancing performance. Additionally, tests on platform's processing capabilities revealed 62% reduction response time compared to traditional systems, times ranging 0.23 0.50 s. Intelligent technology is great significance improving reliability fault tolerance platforms.

Язык: Английский

Процитировано

0

Designing secure blockchain-based authentication and key management mechanism for Internet of Drones applications DOI
Mohammad Wazid, Saksham Mittal, Ashok Kumar Das

и другие.

Journal of Systems Architecture, Год журнала: 2025, Номер unknown, С. 103365 - 103365

Опубликована: Фев. 1, 2025

Язык: Английский

Процитировано

0

Security Analysis and Improvement of Authenticated Key Agreement Protocol for Remote Patient Monitoring IoMT DOI

Deepika Gautam,

Garima Thakur, Mohammad S. Obaidat

и другие.

Опубликована: Окт. 16, 2024

Язык: Английский

Процитировано

0

Blockchain-Assisted Cross-Platform Authentication Protocol with Conditional Traceability for Metaverse Environment in Web 3.0 DOI Creative Commons
Garima Thakur,

Deepika Gautam,

Pankaj Kumar

и другие.

IEEE Open Journal of the Communications Society, Год журнала: 2024, Номер 5, С. 7244 - 7261

Опубликована: Янв. 1, 2024

Язык: Английский

Процитировано

0

A Practically Secure Two-Factor and Mutual Authentication Protocol for Distributed Wireless Sensor Networks Using PUF DOI Open Access
Jiaqing Mo, Zhihua Zhang,

Yuhua Lin

и другие.

Electronics, Год журнала: 2024, Номер 14(1), С. 10 - 10

Опубликована: Дек. 24, 2024

In a distributed wireless sensor network (DWSN), sensors continuously perceive the environment, collect data, and transmit it to remote users through so as realize real-time monitoring of environment or specific targets. However, given openness channels sensitivity collecting designing robust user authentication protocol ensure legitimacy in such DWSN environments faces serious challenges. Most current schemes fail meet some important often overlooked security features, resisting physical impersonation attack, smartcard loss providing forward secrecy. this work, we put practically secure two-factor scheme using physically unclonable function prevent attack node capture utilize Chebyshev chaotic mapping provide secrecy, improve efficiency session key negotiation. Furthermore, use fuzzy verifier technique attackers from offline guessing attacks resist attacks. addition, BAN logic proof heuristic analysis show that achieves mutual agreement well prevents known A comparative with state-of-the-art shows proposal not only desired features but also maintains better efficiency.

Язык: Английский

Процитировано

0