Security Improvement on A Three Party Password Based Authenticated Key Exchange Scheme Using Chaotic Maps
暂无分享,去创建一个
Jeng-Shyang Pan | Yu Chen | Tsu-Yang Wu | Chien-Ming Chen | Shuai Liu | Tsu-Yang Wu | Yu Chen | Chien‐Ming Chen | Shuai Liu | Jeng‐Shyang Pan
[1] Cheng-Chi Lee,et al. A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2012, Nonlinear Dynamics.
[2] Mahmoud Ahmadian-Attari,et al. An Enhanced Authenticated Key Agreement for Session Initiation Protocol , 2013, Inf. Technol. Control..
[3] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[4] Chin-Chen Chang,et al. Chaotic maps-based password-authenticated key agreement using smart cards , 2013, Commun. Nonlinear Sci. Numer. Simul..
[5] Peng Gong,et al. Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials , 2013, Nonlinear Dynamics.
[6] Xuexian Hu,et al. Cryptanalysis and enhancement of a chaotic maps-based three-party password authenticated key exchange protocol , 2014 .
[7] Cheng-Chi Lee,et al. A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013, Nonlinear Dynamics.
[8] Mohammad Sabzinejad Farash,et al. An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps , 2014, Nonlinear Dynamics.
[9] Tian-Fu Lee,et al. An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for Telecare Medicine Information Systems , 2013, Journal of Medical Systems.
[10] Peilin Hong,et al. Security improvement on an anonymous key agreement protocol based on chaotic maps , 2012 .
[11] Xingyuan Wang,et al. An anonymous key agreement protocol based on chaotic maps , 2011 .
[12] Kwok-Wo Wong,et al. On the Security of Public-Key Algorithms Based on Chebyshev Polynomials over the Finite Field $Z_N$ , 2010, IEEE Transactions on Computers.
[13] Xiong Li,et al. Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol , 2015 .
[14] Qi Xie,et al. Chaotic maps-based three-party password-authenticated key agreement scheme , 2013, Nonlinear Dynamics.
[15] Cheng-Chi Lee,et al. A new three-party-authenticated key agreement scheme based on chaotic maps without password table , 2014, Nonlinear Dynamics.