Enhancing the security of password authenticated key agreement protocols based on chaotic maps
From MaRDI portal
Publication:508778
DOI10.1016/J.INS.2014.08.041zbMath1355.94080OpenAlexW1969286014WikidataQ114666913 ScholiaQ114666913MaRDI QIDQ508778
Publication date: 8 February 2017
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.08.041
Related Items (5)
A hybrid-strategy-improved butterfly optimization algorithm applied to the node coverage problem of wireless sensor networks ⋮ An improved secure and efficient password and chaos-based two-party key agreement protocol ⋮ Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy ⋮ Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps ⋮ A Pseudorandom Number Generator Based on a 4D Piecewise Logistic Map with Coupled Parameters
Cites Work
- Unnamed Item
- Unnamed Item
- Chaotic maps-based password-authenticated key agreement using smart cards
- Security improvement on an anonymous key agreement protocol based on chaotic maps
- An anonymous key agreement protocol based on chaotic maps
- An improved key agreement protocol based on chaos
- A novel mutual authentication scheme based on quadratic residues for RFID systems
- Security of a key agreement protocol based on chaotic maps
- Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
- Cryptanalysis of the public key encryption based on multiple chaotic systems
- Using time-stamp to improve the security of a chaotic maps-based key agreement protocol
- Secure group key agreement protocol based on chaotic hash
- Using encryption for authentication in large networks of computers
- Security of public-key cryptosystems based on Chebyshev polynomials
- Efficient network authentication protocols: Lower bounds and optimal implementations
This page was built for publication: Enhancing the security of password authenticated key agreement protocols based on chaotic maps