Page 85 - IJEEE-2022-Vol18-ISSUE-1
P. 85

Hamed & Yassin                                                    | 81

  two-tier wireless body area networks," Computer methods           with untraceability for WBANs," Computer networks, vol.
  and programs in biomedicine, vol. 135, pp. 37-50, 2016.           148, pp. 196-213, 2019.
[35] A. Mehmood, I. Natgunanathan, Y. Xiang, H. Poston, and       [39] A. A. Yassin, J. Yao, and S. Han, "Strong authentication
  Y. Zhang, "Anonymous authentication scheme for smart              scheme based on hand geometry and smart card factors,"
  cloud based healthcare applications," IEEE access, vol. 6, pp.    Computers, vol. 5, no. 3, p. 15, 2016.
  33552-33567, 2018.                                              [40] B. H. Taher, L. H. Wei, and A. A. Yassin, "Flexible and
[36] X. Liu and W. Ma, "ETAP: Energy-efficient and traceable        Efficient Authentication of IoT Cloud Scheme Using Crypto
  authentication protocol in mobile medical cloud                   Hash Function," in Proceedings of the 2018 2nd
  architecture," IEEE Access, vol. 6, pp. 33513-33528, 2018.        International Conference on Computer Science and Artificial
[37] N. El Madhoun and G. Pujolle, "A secure cloud-based            Intelligence, 2018, pp. 487-494.
  NFC payment architecture for small traders," in 2016 3rd        [41] M. H. Alzuwaini and A. A. Yassin, "An Efficient
  Smart Cloud Networks & Systems (SCNS), 2016: IEEE, pp.            Mechanism to Prevent the Phishing Attacks," Iraqi Journal
  1-6.                                                              for Electrical & Electronic Engineering, vol. 17, no. 1, 2021.
[38] M. Kompara, S. H. Islam, and M. Hölbl, "A robust and
  efficient mutual authentication and key agreement scheme
   80   81   82   83   84   85   86   87   88   89   90