Page 86 - 2023-Vol19-Issue2
P. 86
82 | Hamed & Yassin
[16] A. Yazdinejad, G. Srivastava, R. M. Parizi, A. Dehghan-
tanha, K. R. Choo, and M. Aledhari, “Decentralized
authentication of distributed patients in hospital net-
works using blockchain,” IEEE journal of biomedical
and health informatics, vol. 24, no. 8, pp. 2146–2156,
2020.
[17] C. T. Li, D. H. Shih, C. C. Wang, C. L. Chen, and C. C.
Lee, “A blockchain based data aggregation and group
authentication scheme for electronic medical system,”
IEEE Access, vol. 8, pp. 173904–173917, 2020.
[18] X. Cheng, F. Chen, D. Xie, H. Sun, and C. Huang, “De-
sign of a secure medical data sharing scheme based on
blockchain,” Journal of medical systems, vol. 44, no. 2,
pp. 1–11, 2020.
[19] C. Lin, X. H. D. He, M. K. Khan, and K. K. R. Choo,
“A new transitively closed undirected graph authentica-
tion scheme for blockchain-based identity management
systems,” IEEE Access, vol. 6, pp. 28203–28212, 2018.
[20] L. Xiong, F. Li, M. He, Z. Liu, and T. Peng, “An efficient
privacy-aware authentication scheme with hierarchical
access control for mobile cloud computing services,”
IEEE Transactions on Cloud Computing, vol. 10, no. 4,
pp. 2309–2323, 2020.
[21] O. Siedlecka-Lamch, “Probabilistic and timed analysis
of security protocols,” in In Computational Intelligence
in Security for Information Systems Conference, pp. 142–
151, 2019.
[22] M. Kompara, S. H. Islam, and M. Ho¨lbl, “A robust
and efficient mutual authentication and key agreement
scheme with untraceability for wbans,” Computer Net-
works, vol. 148, pp. 196–213, 2019.
[23] T. Y. Wu, L. Yang, Z. Lee, C. M. Chen, J. S. Pan, and
S. Islam, “Improved ecc-based three-factor multiserver
authentication scheme,” Security and Communication
Networks, vol. 2021, 2021.
[24] B. H. Taher, F. A. H. Liu, H. L. A. A. Yassin, and A. J.
Mohammed, “A secure and lightweight three-factor re-
mote user authentication protocol for future iot applica-
tions,” Journal of Sensors, vol. 2021, 2021.
[25] M. H. Alzuwaini and A. A. Yassin, “An efficient mecha-
nism to prevent the phishing attacks,” Iraqi Journal for
Electrical and Electronic Engineering, vol. 17, no. 1,
2021.
[26] A. A. Yassin, J. Yao, and S. Han, “Strong authentication
scheme based on hand geometry and smart card factors,”
Computers, vol. 5, no. 3, 2016.