An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture
暂无分享,去创建一个
Muhammad Sher | Hafiz Farooq Ahmad | Shehzad Ashraf Chaudhry | Azeem Irshad | Bander A. Alzahrani | H. F. Ahmad | A. Irshad | M. Sher | B. Alzahrani | Azeem Irshad
[1] Jianfeng Ma,et al. Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy , 2016 .
[2] Muhammad Sher,et al. An efficient and anonymous multi-server authenticated key agreement based on chaotic map without engaging Registration Centre , 2016, The Journal of Supercomputing.
[3] SK Hafizul Islam,et al. Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps , 2015, Inf. Sci..
[4] Hongfeng Zhu,et al. Flexible and Password-Authenticated Key Agreement Scheme Based on Chaotic Maps for Multiple Servers to Server Architecture , 2015, Wirel. Pers. Commun..
[5] Jin Wang,et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .
[6] Xiong Li,et al. Design and analysis of a chaotic maps-based three-party authenticated key agreement protocol , 2015 .
[7] Wei Liang,et al. Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update , 2015, Int. J. Commun. Syst..
[8] Wei Liang,et al. An Enhancement of a Smart Card Authentication Scheme for Multi-server Architecture , 2015, Wirel. Pers. Commun..
[9] Jin Wang,et al. A Variable Threshold-Value Authentication Architecture for Wireless Mesh Networks , 2014 .
[10] Xiong Li,et al. Applying biometrics to design three-factor remote user authentication scheme with key agreement , 2014, Secur. Commun. Networks.
[11] Jenq-Shiou Leu,et al. Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks , 2014, Wirel. Commun. Mob. Comput..
[12] Mohammad Sabzinejad Farash,et al. An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps , 2014, Nonlinear Dynamics.
[13] Shashikala Tapaswi,et al. Robust Smart Card Authentication Scheme for Multi-server Architecture , 2013, Wireless Personal Communications.
[14] Qi Xie,et al. Chaotic maps-based three-party password-authenticated key agreement scheme , 2013, Nonlinear Dynamics.
[15] Sirma Yavuz,et al. Designing chaotic S-boxes based on time-delay chaotic system , 2013 .
[16] Peng Gong,et al. Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials , 2013, Nonlinear Dynamics.
[17] Kefei Chen,et al. Cryptanalysis and enhancements of efficient three‐party password‐based key exchange scheme , 2013, Int. J. Commun. Syst..
[18] Cheng-Chi Lee,et al. A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013, Nonlinear Dynamics.
[19] Zuowen Tan,et al. A chaotic maps-based authenticated key agreement protocol with strong anonymity , 2013, Nonlinear Dynamics.
[20] Tariq Shah,et al. An efficient approach for the construction of LFT S-boxes using chaotic logistic map , 2012, Nonlinear Dynamics.
[21] Cheng-Chi Lee,et al. A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2012, Nonlinear Dynamics.
[22] Muhammad Khurram Khan,et al. Cryptanalysis of a key agreement protocol based on chaotic Hash , 2013, Int. J. Electron. Secur. Digit. Forensics.
[23] Yixian Yang,et al. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol , 2012 .
[24] Tariq Shah,et al. A novel approach for designing substitution-boxes based on nonlinear chaotic algorithm , 2012, Nonlinear Dynamics.
[25] Eui-nam Huh,et al. A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks , 2012, Secur. Commun. Networks.
[26] Jun-Han Yang,et al. Provably secure three-party password authenticated key exchange protocol in the standard model , 2012, J. Syst. Softw..
[27] Ljupco Kocarev,et al. Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.
[28] Xingyuan Wang,et al. An anonymous key agreement protocol based on chaotic maps , 2011 .
[29] Xing-yuan Wang,et al. An improved key agreement protocol based on chaos , 2010 .
[30] Jiashu Zhang,et al. Secure group key agreement protocol based on chaotic Hash , 2010, Inf. Sci..
[31] Eun-Jun Yoon,et al. Robust biometrics-based multi-server authentication with key agreement scheme for smart cards on elliptic curve cryptosystem , 2010, The Journal of Supercomputing.
[32] Mohsen Guizani,et al. An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network , 2009, IEEE Transactions on Vehicular Technology.
[33] Tao Xiang,et al. On the security of a novel key agreement protocol based on chaotic maps , 2009 .
[34] José M. Amigó,et al. Chaos-Based Cryptography , 2009, Intelligent Computing Based on Chaos.
[35] Song Han,et al. Security of a key agreement protocol based on chaotic maps , 2008 .
[36] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[37] Chun-Ta Li,et al. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..
[38] Jia-Lun Tsai,et al. Efficient multi-server authentication scheme based on one-way hash function without verification table , 2008, Comput. Secur..
[39] Xiaofeng Liao,et al. Using time-stamp to improve the security of a chaotic maps-based key agreement protocol , 2008, Inf. Sci..
[40] A. Akhavan,et al. A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .
[41] Xiaofeng Liao,et al. A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..
[42] Muhammad Khurram Khan,et al. Improving the security of 'a flexible biometrics remote user authentication scheme' , 2007, Comput. Stand. Interfaces.
[43] Kwok-Wo Wong,et al. An efficient entire chaos-based scheme for deniable authentication , 2005 .
[44] Gonzalo Alvarez,et al. Security problems with a chaos-based deniable authentication scheme , 2004, nlin/0412023.
[45] Yu-Chung Chiu,et al. Improved remote authentication scheme with smart card , 2005, Comput. Stand. Interfaces.
[46] Chu-Hsing Lin,et al. A flexible biometrics remote user authentication scheme , 2004, Comput. Stand. Interfaces.
[47] Min-Shiang Hwang,et al. A new remote user authentication scheme for multi-server architecture , 2003, Future Gener. Comput. Syst..
[48] Min-Shiang Hwang,et al. A remote password authentication scheme for multiserver architecture using neural networks , 2001, IEEE Trans. Neural Networks.
[49] Hung-Min Sun,et al. An efficient remote use authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[50] M. Baptista. Cryptography with chaos , 1998 .
[51] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[52] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[53] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[54] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.