Page 85 - IJEEE-2022-Vol18-ISSUE-1
P. 85
Hamed & Yassin | 81
two-tier wireless body area networks," Computer methods with untraceability for WBANs," Computer networks, vol.
and programs in biomedicine, vol. 135, pp. 37-50, 2016. 148, pp. 196-213, 2019.
[35] A. Mehmood, I. Natgunanathan, Y. Xiang, H. Poston, and [39] A. A. Yassin, J. Yao, and S. Han, "Strong authentication
Y. Zhang, "Anonymous authentication scheme for smart scheme based on hand geometry and smart card factors,"
cloud based healthcare applications," IEEE access, vol. 6, pp. Computers, vol. 5, no. 3, p. 15, 2016.
33552-33567, 2018. [40] B. H. Taher, L. H. Wei, and A. A. Yassin, "Flexible and
[36] X. Liu and W. Ma, "ETAP: Energy-efficient and traceable Efficient Authentication of IoT Cloud Scheme Using Crypto
authentication protocol in mobile medical cloud Hash Function," in Proceedings of the 2018 2nd
architecture," IEEE Access, vol. 6, pp. 33513-33528, 2018. International Conference on Computer Science and Artificial
[37] N. El Madhoun and G. Pujolle, "A secure cloud-based Intelligence, 2018, pp. 487-494.
NFC payment architecture for small traders," in 2016 3rd [41] M. H. Alzuwaini and A. A. Yassin, "An Efficient
Smart Cloud Networks & Systems (SCNS), 2016: IEEE, pp. Mechanism to Prevent the Phishing Attacks," Iraqi Journal
1-6. for Electrical & Electronic Engineering, vol. 17, no. 1, 2021.
[38] M. Kompara, S. H. Islam, and M. Hölbl, "A robust and
efficient mutual authentication and key agreement scheme