Enhancing the security of password authenticated key agreement protocols based on chaotic maps (Q508778): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Normalize DOI.
 
(7 intermediate revisions by 7 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.ins.2014.08.041 / rank
Normal rank
 
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 94A62 / rank
 
Normal rank
Property / zbMATH DE Number
 
Property / zbMATH DE Number: 6681900 / rank
 
Normal rank
Property / zbMATH Keywords
 
password
Property / zbMATH Keywords: password / rank
 
Normal rank
Property / zbMATH Keywords
 
authentication
Property / zbMATH Keywords: authentication / rank
 
Normal rank
Property / zbMATH Keywords
 
key agreement protocol
Property / zbMATH Keywords: key agreement protocol / rank
 
Normal rank
Property / zbMATH Keywords
 
chaotic map
Property / zbMATH Keywords: chaotic map / rank
 
Normal rank
Property / zbMATH Keywords
 
network security
Property / zbMATH Keywords: network security / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ins.2014.08.041 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1969286014 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q114666913 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of public-key cryptosystems based on Chebyshev polynomials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: A novel mutual authentication scheme based on quadratic residues for RFID systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient network authentication protocols: Lower bounds and optimal implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chaotic maps-based password-authenticated key agreement using smart cards / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure group key agreement protocol based on chaotic hash / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of a key agreement protocol based on chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4791752 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using encryption for authentication in large networks of computers / rank
 
Normal rank
Property / cites work
 
Property / cites work: An anonymous key agreement protocol based on chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4039972 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An improved key agreement protocol based on chaos / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using time-stamp to improve the security of a chaotic maps-based key agreement protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security improvement on an anonymous key agreement protocol based on chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the public key encryption based on multiple chaotic systems / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.INS.2014.08.041 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 19:52, 9 December 2024

scientific article
Language Label Description Also known as
English
Enhancing the security of password authenticated key agreement protocols based on chaotic maps
scientific article

    Statements

    Enhancing the security of password authenticated key agreement protocols based on chaotic maps (English)
    0 references
    0 references
    8 February 2017
    0 references
    password
    0 references
    authentication
    0 references
    key agreement protocol
    0 references
    chaotic map
    0 references
    network security
    0 references

    Identifiers