A chaotic map‐based anonymous multi‐server authenticated key agreement protocol using smart card
暂无分享,去创建一个
[1] HanCheng Hsiang,et al. A Robust Authentication Protocol for Multi-Server Architecture without Smart Cards , 2013 .
[2] Xiaofeng Liao,et al. A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..
[3] X. Liao,et al. A block cipher with dynamic S-boxes based on tent map , 2009 .
[4] Cheng-Chi Lee,et al. A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2012, Nonlinear Dynamics.
[5] Jia-Lun Tsai,et al. A New Password-Based Multi-server Authentication Scheme Robust to Password Guessing Attacks , 2012, Wireless Personal Communications.
[6] Wuu Yang,et al. A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.
[7] X. Liao,et al. A new chaotic cryptosystem , 2006 .
[8] Debiao He,et al. A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography , 2012, Secur. Commun. Networks.
[9] Yingjiu Li,et al. Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture , 2011, Int. J. Commun. Syst..
[10] Jian Ma,et al. An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards , 2012, J. Netw. Comput. Appl..
[11] Tao Xiang,et al. On the security of a novel key agreement protocol based on chaotic maps , 2009 .
[12] Cheng-Chi Lee,et al. A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013, Nonlinear Dynamics.
[13] Wen-Shenq Juang,et al. Efficient multi-server password authenticated key agreement using smart cards , 2004, IEEE Transactions on Consumer Electronics.
[14] Zuowen Tan,et al. A chaotic maps-based authenticated key agreement protocol with strong anonymity , 2013, Nonlinear Dynamics.
[15] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[16] Song Han,et al. Chaotic map based key agreement with/out clock synchronization , 2009 .
[17] Xingyuan Wang,et al. An anonymous key agreement protocol based on chaotic maps , 2011 .
[18] Eun-Jun Yoon,et al. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps , 2012 .
[19] X. Liao,et al. An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps , 2007 .
[20] Jia-Lun Tsai,et al. Efficient multi-server authentication scheme based on one-way hash function without verification table , 2008, Comput. Secur..
[21] Xing-yuan Wang,et al. An improved key agreement protocol based on chaos , 2010 .
[22] Kuo-Hui Yeh,et al. A NOVEL REMOTE USER AUTHENTICATION SCHEME FOR MULTI-SERVER ENVIRONMENT WITHOUT USING SMART CARDS , 2010 .
[23] Eun-Jun Yoon,et al. A New Key Agreement Protocol Based on Chaotic Maps , 2008, KES-AMSTA.
[24] Debiao He,et al. Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol , 2012, Nonlinear Dynamics.
[25] Peilin Hong,et al. Security improvement on an anonymous key agreement protocol based on chaotic maps , 2012 .
[26] Eunjun Yoon,et al. An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map , 2011 .
[27] Ping Li,et al. A secure chaotic maps-based key agreement protocol without using smart cards , 2012 .
[28] M. Baptista. Cryptography with chaos , 1998 .
[29] Cheng-Chi Lee,et al. An extended chaotic maps-based key agreement protocol with user anonymity , 2011, Nonlinear Dynamics.
[30] Weiwei Han. Weaknesses of a dynamic identity based authentication protocol for multi-server architecture , 2012, ArXiv.
[31] I. C. Lin,et al. (IEEE Transactions on Neural Networks,12(6):1498-1504)A Remote Password Authentication Scheme for Multi-Server Architecture Using Neural Network , 2001 .
[32] Chin-Chen Chang,et al. Chaotic maps-based password-authenticated key agreement using smart cards , 2013, Commun. Nonlinear Sci. Numer. Simul..
[33] Chin-Chen Chang,et al. An efficient and secure multi-server password authentication scheme using smart cards , 2004, 2004 International Conference on Cyberworlds.
[34] X. Liao,et al. One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .
[35] Song Han,et al. Security of a key agreement protocol based on chaotic maps , 2008 .
[36] Jiashu Zhang,et al. Secure group key agreement protocol based on chaotic Hash , 2010, Inf. Sci..
[37] Xiaofeng Liao,et al. Using time-stamp to improve the security of a chaotic maps-based key agreement protocol , 2008, Inf. Sci..