Bera et al., 2025
| Publication | Publication Date | Title |
|---|---|---|
| Das et al. | Design of secure and lightweight authentication protocol for wearable devices environment | |
| Praveen et al. | A secure lightweight fuzzy embedder based user authentication scheme for internet of medical things applications | |
| Wazid et al. | Design of an efficient and provably secure anonymity preserving three‐factor user authentication and key agreement scheme for TMIS | |
| CN107819587B (en) | Authentication method based on fully homomorphic encryption, user equipment and authentication server | |
| Zhang et al. | Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme | |
| Amin et al. | Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems | |
| Alzahrani | Secure and efficient cloud-based IoT authenticated key agreement scheme for e-health wireless sensor networks | |
| Praveen et al. | Improved Gentry–Halevi's fully homomorphic encryption‐based lightweight privacy preserving scheme for securing medical Internet of Things | |
| Soni et al. | Cybersecurity attack-resilience authentication mechanism for intelligent healthcare system | |
| Zhang et al. | A complete user authentication and key agreement scheme using cancelable biometrics and PUF in multi-server environment | |
| Belkhouja et al. | Biometric-based authentication scheme for implantable medical devices during emergency situations | |
| JP2017076839A (en) | Cryptographic processing method, cryptographic processing apparatus, and cryptographic processing program | |
| Alzahrani et al. | An improved lightweight authentication protocol for wireless body area networks | |
| Srinivas et al. | Provably secure biometric based authentication and key agreement protocol for wireless sensor networks | |
| Zhang et al. | Privacy-preserving fast three-factor authentication and key agreement for IoT-based E-health systems | |
| Reddy et al. | A privacy preserving three-factor authenticated key agreement protocol for client–server environment | |
| Irshad et al. | Fuzzy-in-the-loop-driven low-cost and secure biometric user access to server | |
| Yu et al. | SALS-TMIS: Secure, anonymous, and lightweight privacy-preserving scheme for IoMT-enabled TMIS environments | |
| Wu et al. | Privacy-preserving cancelable biometric authentication based on RDM and ECC | |
| Alruwaili et al. | Securing the IoT-enabled smart healthcare system: A PUF-based resource-efficient authentication mechanism | |
| Han et al. | A secure two-factor authentication key exchange scheme | |
| Xie et al. | A multi server authentication protocol with integrated monitoring for iomt based healthcare system | |
| Saleem et al. | Provably Secure Authenticated Key-Management Mechanism for e-Healthcare Environment | |
| Tran et al. | Biometrics-based authenticated key exchange with multi-factor fuzzy extractor | |
| Sammoud et al. | A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity |