A robust smart card and remote user password-based authentication protocol using extended chaotic maps under smart cities environment

[1]  Muhammad Khurram Khan,et al.  Cryptanalysis and improvement of ‘a robust smart‐card‐based remote user password authentication scheme’ , 2014, Int. J. Commun. Syst..

[2]  Xiong Li,et al.  An enhanced smart card based remote user password authentication scheme , 2013, J. Netw. Comput. Appl..

[3]  Chunguang Ma,et al.  Security flaws in two improved remote user authentication schemes using smart cards , 2014, Int. J. Commun. Syst..

[4]  Maged Hamada Ibrahim,et al.  Secure anonymous mutual authentication for star two-tier wireless body area networks , 2016, Comput. Methods Programs Biomed..

[5]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[6]  Jianhua Chen,et al.  An efficient two‐party authentication key exchange protocol for mobile environment , 2017, Int. J. Commun. Syst..

[7]  Alfredo De Santis,et al.  Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.

[8]  SK Hafizul Islam,et al.  Design and analysis of an improved smartcard‐based remote user password authentication scheme , 2016, Int. J. Commun. Syst..

[9]  Dengguo Feng,et al.  An improved smart card based password authentication scheme with provable security , 2009, Comput. Stand. Interfaces.

[10]  Debiao He,et al.  An efficient chaos‐based 2‐party key agreement protocol with provable security , 2017, Int. J. Commun. Syst..

[11]  Robert H. Sloan,et al.  Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.

[12]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[13]  Chin-Chen Chang,et al.  A robust and efficient dynamic identity‐based multi‐server authentication scheme using smart cards , 2016, Int. J. Commun. Syst..

[14]  Lih-Chyau Wuu,et al.  Robust smart‐card‐based remote user password authentication scheme , 2014, Int. J. Commun. Syst..

[15]  Ronggong Song Advanced smart card based password authentication protocol , 2010, Comput. Stand. Interfaces.

[16]  Kwok-Wo Wong,et al.  Period distribution analysis of some linear maps , 2012 .

[17]  Mohammad Sabzinejad Farash An improved password-based authentication scheme for session initiation protocol using smart cards without verification table , 2017, Int. J. Commun. Syst..

[18]  Chun Chen,et al.  Lightweight and provably secure user authentication with anonymity for the global mobility network , 2011, Int. J. Commun. Syst..

[19]  Song Han,et al.  Chaotic map based key agreement with/out clock synchronization , 2009 .

[20]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[21]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[22]  Xiong Li,et al.  A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security , 2016, Wireless Personal Communications.

[23]  Xinsong Liu,et al.  Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme , 2012, Int. J. Commun. Syst..