Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme
暂无分享,去创建一个
[1] Jia-Lun Tsai,et al. New dynamic ID authentication scheme using smart cards , 2010, Int. J. Commun. Syst..
[2] Debiao He,et al. Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol , 2012, Nonlinear Dynamics.
[3] Muhammad Khurram Khan,et al. Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme' , 2011, Comput. Commun..
[4] Eun-Jun Yoon,et al. A user friendly authentication scheme with anonymity for wireless communications , 2011, Comput. Electr. Eng..
[5] Yan-yan Wang,et al. A more efficient and secure dynamic ID-based remote user authentication scheme , 2009, Comput. Commun..
[6] Xinsong Liu,et al. Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme , 2012, Int. J. Commun. Syst..
[7] Zhang Rui,et al. A More Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of medical systems.
[8] Min-Shiang Hwang,et al. A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..
[9] Song Han,et al. Security of a key agreement protocol based on chaotic maps , 2008 .
[10] Wei-Chi Ku,et al. Impersonation Attack on a Dynamic ID-Based Remote User Authentication Scheme Using Smart Cards , 2005, IEICE Trans. Commun..
[11] Mohammed Misbahuddin,et al. Cryptanalysis of Liao-Lee-Hwang's Dynamic ID Scheme , 2008, Int. J. Netw. Secur..
[12] Peilin Hong,et al. Security improvement on an anonymous key agreement protocol based on chaotic maps , 2012 .
[13] Hung-Min Sun,et al. Attacks and Solutions on Strong-Password Authentication , 2001 .
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] Cheng-Chi Lee,et al. A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps , 2013 .
[16] Xiaofeng Liao,et al. A novel key agreement protocol based on chaotic maps , 2007, Inf. Sci..
[17] Chun Chen,et al. Lightweight and provably secure user authentication with anonymity for the global mobility network , 2011, Int. J. Commun. Syst..
[18] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[19] Hirohito Inagaki,et al. A Password Authentication Method for Contents Communications on the Internet , 1998 .
[20] Cheng-Chi Lee,et al. An extended chaotic maps-based key agreement protocol with user anonymity , 2011, Nonlinear Dynamics.
[21] Wuu Yang,et al. A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity , 2009, 2009 IEEE International Conference on Communications.
[22] Zhenfu Cao,et al. An efficient anonymous authentication mechanism for delay tolerant networks , 2010, Comput. Electr. Eng..
[23] Cheng-Chi Lee,et al. Security enhancement for a dynamic ID-based remote user authentication scheme , 2005, International Conference on Next Generation Web Services Practices (NWeSP'05).
[24] Amit K. Awasthi. Comment on A dynamic ID-based Remote User Authentication Scheme , 2004, ArXiv.
[25] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[26] Zuowen Tan,et al. A chaotic maps-based authenticated key agreement protocol with strong anonymity , 2013 .
[27] Xingyuan Wang,et al. An anonymous key agreement protocol based on chaotic maps , 2011 .
[28] Akihiro Shimizu,et al. A dynamic password authentication method using a one-way function , 1991, Systems and Computers in Japan.
[29] Chin-Laung Lei,et al. Robust authentication and key agreement scheme preserving the privacy of secret key , 2011, Comput. Commun..
[30] Ping Li,et al. A secure chaotic maps-based key agreement protocol without using smart cards , 2012 .
[31] Ashutosh Saxena,et al. A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.
[32] M. Baptista. Cryptography with chaos , 1998 .
[33] Cheng-Chi Lee,et al. A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2013 .
[34] Yuefei Zhu,et al. Robust smart-cards-based user authentication scheme with user anonymity , 2012, Secur. Commun. Networks.
[35] Eun-Jun Yoon,et al. Improving the Dynamic ID-Based Remote Mutual Authentication Scheme , 2006, OTM Workshops.
[36] Wen-Shenq Juang,et al. Two efficient two-factor authenticated key exchange protocols in public wireless LANs , 2009, Comput. Electr. Eng..
[37] Xuelei Li,et al. An improved dynamic ID-based remote user authentication with key agreement scheme , 2012, Comput. Electr. Eng..