An Efficient and Secure Key Agreement Protocol Preserving User Anonymity Under Chebyshev Chaotic Maps
暂无分享,去创建一个
Li Tao | Fuyuan Xiao | Cheng Zhan | Hong Lai | Mingxing Luo | Xiaofang Hu | Hong Lai | M. Luo | Xiaofang Hu | Fuyuan Xiao | Cheng Zhan | Li Tao
[1] Wuu Yang,et al. A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.
[2] Xing-yuan Wang,et al. A chaotic image encryption algorithm based on perceptron model , 2010 .
[3] Yixian Yang,et al. Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol , 2012 .
[4] T. J. Rivlin. The Chebyshev polynomials , 1974 .
[5] Song Han,et al. Chaotic map based key agreement with/out clock synchronization , 2009 .
[6] Xingyuan Wang,et al. An anonymous key agreement protocol based on chaotic maps , 2011 .
[7] Eun-Jun Yoon,et al. Efficiency and security problems of anonymous key agreement protocol based on chaotic maps , 2012 .
[8] Xing-yuan Wang,et al. An improved key agreement protocol based on chaos , 2010 .
[9] Eunjun Yoon,et al. An efficient and secure Diffie–Hellman key agreement protocol based on Chebyshev chaotic map , 2011 .
[10] Song Han,et al. Security of a key agreement protocol based on chaotic maps , 2008 .
[11] Peilin Hong,et al. Security improvement on an anonymous key agreement protocol based on chaotic maps , 2012 .
[12] Xiaofeng Liao,et al. A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..
[13] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .