


Springer, New York, pp 232–249īrown D (2005) Generic groups, collision resistance, and ECDSA. Lecture notes in computer science, vol 773.

In: Stinson DR (ed) Advances in cryptology-CRYPTO’ 93. J Med Syst 39(11):1–20īellare M, Rogaway P (1994) Entity authentication and key distribution. J Med Syst 39(11):1–18Īmin R, Islam SH, Biswas GP, Khan MK, Obaidat MS (2015b) Design and analysis of an enhanced patient-server mutual authentication protocol for telecare medical information system. J Med Syst 39(8):1–19Īmin R, Islam SH, Biswas GP, Khan MK, Kumar N (2015a) An efficient and practical smart card based anonymity preserving user authentication scheme for TMIS using elliptic curve cryptography. In: Proceedings of the PKC’05, vol 3386, Lecture Notes in Computer Science, Springer, Interlaken, pp 65–84Īmin R, Biswas GPA (2015) Secure three-factor user authentication and key agreement protocols for TMIS with user anonymity. The proposed scheme needs minimum computation cost compared with the related authentication schemes using smart card.Ībdalla M, Fouque P, Pointcheval D (2005) Password-based authenticated key exchange in the three-party setting. The proposed scheme generates new session key for every new session with fresh time stamp and nonce value. The proposed authentication is based on two-factor authentication with smart card and password, which provides high security with minimum computational cost. In this chapter, we have proposed a two factor authentication scheme using Elliptic Curve Cryptography with smart card. In this situation, we are in the need of an efficient authentication mechanism for providing secure communication between the users. The IoT application is an information process and sharing between large volumes of users. Security is one of the most important key issue in any kind of information system. IoT application provides strong connectivity between inter-connected devices, which shares valuable data through a common channel.
#Oxygen forensics saving device calculating hash sum software
IoT plays important role in the field of inter-networked applications, like physical electronic devices, vehicles, automobile applications, software applications, sensors devices, buildings, government offices and defense departments.
