A new three-party-authenticated key agreement scheme based on chaotic maps without password table
暂无分享,去创建一个
Cheng-Chi Lee | Yan-Ming Lai | Chun-Ta Li | Shih-Ting Chiu | Cheng-Chi Lee | Chun-Ta Li | Yan-Ming Lai | Shih-Ting Chiu
[1] Xingyuan Wang,et al. An anonymous key agreement protocol based on chaotic maps , 2011 .
[2] Eun-Jun Yoon,et al. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps , 2012 .
[3] Marcelo C. M. Teixeira,et al. Design of a Takagi-Sugeno Fuzzy Regulator for a Set of Operation Points , 2012 .
[4] Peilin Hong,et al. Security improvement on an anonymous key agreement protocol based on chaotic maps , 2012 .
[5] Mohammad Sabzinejad Farash,et al. An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps , 2014 .
[6] Mahmoud Ahmadian-Attari,et al. An Enhanced and Secure Three-Party Password-based Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems , 2014, Inf. Technol. Control..
[7] Mahmoud Ahmadian-Attari,et al. An Enhanced Authenticated Key Agreement for Session Initiation Protocol , 2013, Inf. Technol. Control..
[8] Mahmoud Ahmadian-Attari,et al. A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks , 2014, The Journal of Supercomputing.
[9] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[10] Yixian Yang,et al. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol , 2012 .
[11] Cheng-Chi Lee,et al. A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013 .
[12] Mohammad Sabzinejad Farash. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table , 2017, Int. J. Commun. Syst..
[13] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[14] Mahmoud Ahmadian-Attari,et al. An efficient client–client password-based authentication scheme with provable security , 2014, The Journal of Supercomputing.
[15] T. J. Rivlin. The Chebyshev polynomials , 1974 .
[16] Mahmoud Ahmadian-Attari,et al. An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards , 2016, Int. J. Commun. Syst..
[17] Cheng-Chi Lee. A simple key agreement scheme based on chaotic maps for VSAT satellite communications , 2013, Int. J. Satell. Commun. Netw..
[18] Cheng-Chi Lee,et al. A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2013 .
[19] Peng Gong,et al. Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials , 2013, Nonlinear Dynamics.
[20] Cheng-Chi Lee,et al. An undetectable on-line password guessing attack on Nam et al.'s three-party key exchange protocol , 2013, J. Comput. Methods Sci. Eng..
[21] Wuu Yang,et al. A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.
[22] Qi Xie,et al. Chaotic maps-based three-party password-authenticated key agreement scheme , 2013 .
[23] Cheng-Chi Lee,et al. An extended chaotic maps-based key agreement protocol with user anonymity , 2011, Nonlinear Dynamics.
[24] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[25] Chin-Chen Chang,et al. Chaotic maps-based password-authenticated key agreement using smart cards , 2013, Commun. Nonlinear Sci. Numer. Simul..
[26] Cheng-Chi Lee,et al. A Computation-Efficient Three-Party Encrypted Key Exchange Protocol , 2012 .
[27] Cheng-Chi Lee,et al. An extended chaotic-maps-based protocol with key agreement for multiserver environments , 2013, Nonlinear Dynamics.
[28] Xing-yuan Wang,et al. An improved key agreement protocol based on chaos , 2010 .