Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks
暂无分享,去创建一个
[1] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[2] Ashok Kumar Das. Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks , 2012, Int. J. Netw. Secur..
[3] Kwangjo Kim,et al. Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks , 2012, Ad Hoc Sens. Wirel. Networks.
[4] Victor Shoup,et al. Sequences of games: a tool for taming complexity in security proofs , 2004, IACR Cryptol. ePrint Arch..
[5] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[6] Chun Chen,et al. An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks , 2010, Ad Hoc Sens. Wirel. Networks.
[7] Ronggong Song. Advanced smart card based password authentication protocol , 2010, Comput. Stand. Interfaces.
[8] Cheng-Chi Lee,et al. An extended chaotic maps-based key agreement protocol with user anonymity , 2011, Nonlinear Dynamics.
[9] Tian-Fu Lee. User authentication scheme with anonymity, unlinkability and untrackability for global mobility networks , 2013, Secur. Commun. Networks.
[10] Cheng-Chi Lee,et al. A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2012, Nonlinear Dynamics.
[11] Tian-Fu Lee,et al. An Efficient Chaotic Maps-Based Authentication and Key Agreement Scheme Using Smartcards for Telecare Medicine Information Systems , 2013, Journal of Medical Systems.
[12] John A. Stankovic,et al. Practical and secure localization and key distribution for wireless sensor networks , 2012, Ad Hoc Networks.
[13] Ljupco Kocarev,et al. Public-key encryption based on Chebyshev maps , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[14] Tzonelih Hwang,et al. Provably secure and efficient authentication techniques for the global mobility network , 2011, J. Syst. Softw..
[15] Donghoon Lee,et al. Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks , 2014, Sensors.
[16] José María Sierra,et al. A light-weight authentication scheme for wireless sensor networks , 2011, Ad Hoc Networks.
[17] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[18] Cheng-Chi Lee,et al. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks , 2013, Sensors.
[19] Hsin-Wen Wei,et al. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography , 2011, Sensors.
[20] T. J. Rivlin. The Chebyshev polynomials , 1974 .
[21] Der-Chyuan Lou,et al. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems , 2015, Journal of Medical Systems.
[22] Chun-Ta Li,et al. A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks , 2011, Inf. Sci..
[23] Kefei Chen,et al. An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System , 2012, Journal of Medical Systems.
[24] Wei-Kuan Shih,et al. A Robust Mutual Authentication Protocol for Wireless Sensor Networks , 2010 .
[25] Peilin Hong,et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..
[26] X. Liao,et al. One-way Hash function construction based on the chaotic map with changeable-parameter , 2005 .
[27] Tian-Fu Lee,et al. Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems , 2014, Comput. Methods Programs Biomed..
[28] Guang Gong,et al. Computationally efficient mutual entity authentication in wireless sensor networks , 2011, Ad Hoc Networks.
[29] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[30] Jiannong Cao,et al. A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).
[31] Alfred Menezes,et al. Topics in Cryptology – CT-RSA 2005 , 2005 .
[32] Mohammad Sabzinejad Farash,et al. An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps , 2014, Nonlinear Dynamics.
[33] J. Dicapua. Chebyshev Polynomials , 2019, Fibonacci and Lucas Numbers With Applications.
[34] Muhammad Khurram Khan,et al. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.
[35] Yun Liu,et al. Authenticated RFID security mechanism based on chaotic maps , 2013, Secur. Commun. Networks.
[36] Alfredo De Santis,et al. Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.
[37] Huang Jie,et al. A Public Key Polynomial-based Key Pre-distribution Scheme for Large-Scale Wireless Sensor Networks , 2012, Ad Hoc Sens. Wirel. Networks.
[38] Linhua Zhang. Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .
[39] Dengguo Feng,et al. An improved smart card based password authentication scheme with provable security , 2009, Comput. Stand. Interfaces.
[40] HuiFeng Huang,et al. Advanced Smart Card Based Password Authentication with User Anonymity , 2012 .