A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment
暂无分享,去创建一个
Rabha W. Ibrahim | Lunzhi Deng | Sarita Gajbhiye Meshram | Chandrashekhar Meshram | Shailendra W. Shende | Sharad Kumar Barve | S. G. Meshram | R. Ibrahim | C. Meshram | Lunzhi Deng
[1] Muhammad Khurram Khan,et al. Cryptanalysis and improvement of ‘a robust smart‐card‐based remote user password authentication scheme’ , 2014, Int. J. Commun. Syst..
[2] Xiong Li,et al. An enhanced smart card based remote user password authentication scheme , 2013, J. Netw. Comput. Appl..
[3] Chunguang Ma,et al. Security flaws in two improved remote user authentication schemes using smart cards , 2014, Int. J. Commun. Syst..
[4] Maged Hamada Ibrahim,et al. Secure anonymous mutual authentication for star two-tier wireless body area networks , 2016, Comput. Methods Programs Biomed..
[5] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[6] Jianhua Chen,et al. An efficient two‐party authentication key exchange protocol for mobile environment , 2017, Int. J. Commun. Syst..
[7] Alfredo De Santis,et al. Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.
[8] SK Hafizul Islam,et al. Design and analysis of an improved smartcard‐based remote user password authentication scheme , 2016, Int. J. Commun. Syst..
[9] Dengguo Feng,et al. An improved smart card based password authentication scheme with provable security , 2009, Comput. Stand. Interfaces.
[10] Debiao He,et al. An efficient chaos‐based 2‐party key agreement protocol with provable security , 2017, Int. J. Commun. Syst..
[11] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[12] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[13] Chin-Chen Chang,et al. A robust and efficient dynamic identity‐based multi‐server authentication scheme using smart cards , 2016, Int. J. Commun. Syst..
[14] Lih-Chyau Wuu,et al. Robust smart‐card‐based remote user password authentication scheme , 2014, Int. J. Commun. Syst..
[15] Ronggong Song. Advanced smart card based password authentication protocol , 2010, Comput. Stand. Interfaces.
[16] Kwok-Wo Wong,et al. Period distribution analysis of some linear maps , 2012 .
[17] Mohammad Sabzinejad Farash. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table , 2017, Int. J. Commun. Syst..
[18] Chun Chen,et al. Lightweight and provably secure user authentication with anonymity for the global mobility network , 2011, Int. J. Commun. Syst..
[19] Song Han,et al. Chaotic map based key agreement with/out clock synchronization , 2009 .
[20] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[21] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[22] Xiong Li,et al. A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security , 2016, Wireless Personal Communications.
[23] Xinsong Liu,et al. Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme , 2012, Int. J. Commun. Syst..