A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem
暂无分享,去创建一个
Hongfeng Zhu | Yifeng Zhang | Man Jiang | Xin Hao | Hongfeng Zhu | Xin Hao | Yifeng Zhang | Man Jiang
[1] Yuh-Min Tseng,et al. An efficient user authentication and key exchange protocol for mobile client-server environment , 2010, Comput. Networks.
[2] Chun-Ta Li,et al. An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..
[3] Ching-Chun Chang,et al. A Secure and Efficient Authentication Scheme for E-coupon Systems , 2014, Wireless Personal Communications.
[4] Yuh-Min Tseng,et al. An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices , 2010, Comput. J..
[5] Wen-Shenq Juang,et al. Efficient multi-server password authenticated key agreement using smart cards , 2004, IEEE Transactions on Consumer Electronics.
[6] Sudhish N. George,et al. A novel approach for secure compressive sensing of images using multiple chaotic maps , 2014 .
[7] Tzonelih Hwang,et al. Non-interactive password authentications without password tables , 1990, IEEE TENCON'90: 1990 IEEE Region 10 Conference on Computer and Communication Systems. Conference Proceedings.
[8] Cheng-Chi Lee,et al. A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013, Nonlinear Dynamics.
[9] Jue-Sam Chou,et al. Security weaknesses in two multi-server password based authentication protocols , 2009, IACR Cryptol. ePrint Arch..
[10] Xiaomin Wang,et al. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices , 2008 .
[11] Cheng-Chi Lee. A simple key agreement scheme based on chaotic maps for VSAT satellite communications , 2013, Int. J. Satell. Commun. Netw..
[12] Sang-Gon Lee. Cryptanalysis of Multiple-Server Password-Authenticated Key , 2009, IACR Cryptol. ePrint Arch..
[13] Chin-Chen Chang,et al. Chaotic maps-based password-authenticated key agreement using smart cards , 2013, Commun. Nonlinear Sci. Numer. Simul..
[14] Jayaprakash Kar,et al. An Efficient Password Security of Multi-Party Key Exchange Protocol based on ECDLP , 2009 .
[15] Chin-Chen Chang,et al. An efficient and secure multi-server password authentication scheme using smart cards , 2004, 2004 International Conference on Cyberworlds.
[16] Yuh-Min Tseng,et al. Towards generalized ID-based user authentication for mobile multi-server environment , 2012, Int. J. Commun. Syst..
[17] Muhammad Khurram Khan,et al. Improving the security of 'a flexible biometrics remote user authentication scheme' , 2007, Comput. Stand. Interfaces.
[18] Yu-Chung Chiu,et al. Improved remote authentication scheme with smart card , 2005, Comput. Stand. Interfaces.
[19] Hideki Imai,et al. Theoretical framework for constructing matching algorithms in biometric authentication systems , 2009, ICB.
[20] Yalin Chen,et al. Comments on two multi-server authentication protocols , 2008, IACR Cryptol. ePrint Arch..
[21] Chin-Chen Chang,et al. Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications , 2013, J. Inf. Hiding Multim. Signal Process..
[22] Jia-Lun Tsai,et al. Efficient multi-server authentication scheme based on one-way hash function without verification table , 2008, Comput. Secur..
[23] Bin Wang,et al. A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme , 2012, Wireless Personal Communications.
[24] Ping Li,et al. A secure chaotic maps-based key agreement protocol without using smart cards , 2012 .
[25] Eun-Jun Yoon,et al. Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem , 2010, The Journal of Supercomputing.
[26] Qi Xie,et al. Chaotic maps-based three-party password-authenticated key agreement scheme , 2013, Nonlinear Dynamics.
[27] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[28] Tariq Shah,et al. Application of S-box and chaotic map for image encryption , 2013, Math. Comput. Model..
[29] Jian Ma,et al. A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments , 2013, Math. Comput. Model..
[30] Iqtadar Hussain,et al. A technique for digital steganography using chaotic maps , 2014 .
[31] Zhijian Wang,et al. An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm , 2014, TheScientificWorldJournal.
[32] Wen-Chung Kuo,et al. A new digital signature scheme based on chaotic maps , 2013, Nonlinear dynamics.
[33] Cheng-Chi Lee,et al. An extended chaotic maps-based key agreement protocol with user anonymity , 2011, Nonlinear Dynamics.
[34] Shahram Etemadi Borujeni,et al. Image Encryption Using Random Bit Sequence Based on Chaotic Maps , 2013, Arabian Journal for Science and Engineering.