Salvakkam et al., 2024
| Publication | Publication Date | Title |
|---|---|---|
| CN111639361B (en) | A block chain key management method, multi-person co-signature method and electronic device | |
| Li et al. | An enhancement of a smart card authentication scheme for multi-server architecture | |
| Wu et al. | ID-based encryption with equality test against insider attack | |
| Lin et al. | An improved anonymous multi-server authenticated key agreement scheme using smart cards and biometrics | |
| Karuppiah et al. | A dynamic id-based generic framework for anonymous authentication scheme for roaming service in global mobility networks | |
| Darwish et al. | Decentralizing privacy implementation at cloud storage using blockchain-based hybrid algorithm | |
| Dharminder et al. | LWESM: learning with error based secure communication in mobile devices using fuzzy extractor | |
| Sahoo et al. | Improved biometric-based mutual authentication and key agreement scheme using ECC | |
| Salvakkam et al. | Design of fully homomorphic multikey encryption scheme for secured cloud access and storage environment | |
| Bouchaala et al. | Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card | |
| Huang et al. | An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture | |
| US11700125B2 (en) | zkMFA: zero-knowledge based multi-factor authentication system | |
| Rehman et al. | A secure and improved multi server authentication protocol using fuzzy commitment | |
| Srinivas et al. | A self-verifiable password based authentication scheme for multi-server architecture using smart card | |
| Hamian et al. | Blockchain-based user re-enrollment for biometric authentication systems | |
| Khan et al. | A brief review on cloud computing authentication frameworks | |
| Salami et al. | CE-SKE: cost-effective secure key exchange scheme in Fog Federation | |
| Li et al. | Secure data access and sharing scheme for cloud storage | |
| Tomar et al. | An ECC based secure authentication and key exchange scheme in multi-server environment | |
| Duan et al. | Design of anonymous authentication scheme for vehicle fog services using blockchain | |
| Zhu et al. | A provable authenticated key agreement protocol with privacy protection using smart card based on chaotic maps | |
| Dadsena et al. | A construction of post quantum secure authenticated key agreement design for mobile digital rights management system | |
| Huszti et al. | A simple authentication scheme for clouds | |
| Dayanikli et al. | Password-based credentials with security against server compromise | |
| Thangavel et al. | An analysis of privacy preservation schemes in cloud computing |