Page 86 - 2023-Vol19-Issue2
P. 86

82 |                                                             Hamed & Yassin

[16] A. Yazdinejad, G. Srivastava, R. M. Parizi, A. Dehghan-
      tanha, K. R. Choo, and M. Aledhari, “Decentralized
      authentication of distributed patients in hospital net-
      works using blockchain,” IEEE journal of biomedical
      and health informatics, vol. 24, no. 8, pp. 2146–2156,
      2020.

[17] C. T. Li, D. H. Shih, C. C. Wang, C. L. Chen, and C. C.
      Lee, “A blockchain based data aggregation and group
      authentication scheme for electronic medical system,”
      IEEE Access, vol. 8, pp. 173904–173917, 2020.

[18] X. Cheng, F. Chen, D. Xie, H. Sun, and C. Huang, “De-
      sign of a secure medical data sharing scheme based on
      blockchain,” Journal of medical systems, vol. 44, no. 2,
      pp. 1–11, 2020.

[19] C. Lin, X. H. D. He, M. K. Khan, and K. K. R. Choo,
      “A new transitively closed undirected graph authentica-
      tion scheme for blockchain-based identity management
      systems,” IEEE Access, vol. 6, pp. 28203–28212, 2018.

[20] L. Xiong, F. Li, M. He, Z. Liu, and T. Peng, “An efficient
      privacy-aware authentication scheme with hierarchical
      access control for mobile cloud computing services,”
      IEEE Transactions on Cloud Computing, vol. 10, no. 4,
      pp. 2309–2323, 2020.

[21] O. Siedlecka-Lamch, “Probabilistic and timed analysis
      of security protocols,” in In Computational Intelligence
      in Security for Information Systems Conference, pp. 142–
      151, 2019.

[22] M. Kompara, S. H. Islam, and M. Ho¨lbl, “A robust
      and efficient mutual authentication and key agreement
      scheme with untraceability for wbans,” Computer Net-
      works, vol. 148, pp. 196–213, 2019.

[23] T. Y. Wu, L. Yang, Z. Lee, C. M. Chen, J. S. Pan, and
      S. Islam, “Improved ecc-based three-factor multiserver
      authentication scheme,” Security and Communication
      Networks, vol. 2021, 2021.

[24] B. H. Taher, F. A. H. Liu, H. L. A. A. Yassin, and A. J.
      Mohammed, “A secure and lightweight three-factor re-
      mote user authentication protocol for future iot applica-
      tions,” Journal of Sensors, vol. 2021, 2021.

[25] M. H. Alzuwaini and A. A. Yassin, “An efficient mecha-
      nism to prevent the phishing attacks,” Iraqi Journal for
      Electrical and Electronic Engineering, vol. 17, no. 1,
      2021.

[26] A. A. Yassin, J. Yao, and S. Han, “Strong authentication
      scheme based on hand geometry and smart card factors,”
      Computers, vol. 5, no. 3, 2016.
   81   82   83   84   85   86   87   88   89   90   91