Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …
protocols based on public-key techniques have attracted much attention, providing secure …
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps
Spread of wireless network technology has opened new doors to utilize sensor technology
in various areas via Wireless Sensor Networks (WSNs). Many authentication protocols for …
in various areas via Wireless Sensor Networks (WSNs). Many authentication protocols for …
[PDF][PDF] Logistic 混沌映射性能分析与改进
陈志刚, 梁涤青, 邓小鸿, 张颖 - 电子与信息学报, 2016 - edit.jeit.ac.cn
混沌系统是基于混沌的数据加密领域的一个重要研究对象, Logistic 混沌映射是最简单和有效的
混沌系统, 被广泛应用在大多数混沌加密算法中, Logistic 映射的安全性成为研究的热点 …
混沌系统, 被广泛应用在大多数混沌加密算法中, Logistic 映射的安全性成为研究的热点 …
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
Q Jiang, F Wei, S Fu, J Ma, G Li, A Alelaiwi - Nonlinear Dynamics, 2016 - Springer
Due to its high level of security, three-factor authentication combining password, smart card
and biometrics has received much interest in the past decades. Recently, Islam proposed a …
and biometrics has received much interest in the past decades. Recently, Islam proposed a …
Secure-user sign-in authentication for IoT-based eHealth systems
BD Deebak, F Al-Turjman - Complex & Intelligent Systems, 2023 - Springer
Sustainable Computing has advanced the technological evolution of the Internet and
information-based communication technology. It is nowadays emerging in the form of the …
information-based communication technology. It is nowadays emerging in the form of the …
An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring
With the rapid growth of wireless medical sensor networks (WMSNs) based healthcare
applications, protecting both the privacy and security from illegitimate users, are major …
applications, protecting both the privacy and security from illegitimate users, are major …
An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map
Abstract Telecare Medical Information System (TMIS) is a platform for the patients and the
medical server to communicate and exchange data through the Internet. As the Internet is an …
medical server to communicate and exchange data through the Internet. As the Internet is an …
A secure chaotic map-based remote authentication scheme for telecare medicine information systems
As a kind of e-health notion, telemedicine employs telecommunication and information
technologies to provide remote clinical health care. Telecare medicine information system …
technologies to provide remote clinical health care. Telecare medicine information system …
A lightweight mutual and transitive authentication mechanism for IoT network
R Krishnasrija, AK Mandal, A Cortesi - Ad Hoc Networks, 2023 - Elsevier
IoT devices are typically authenticated directly by gateways present in the network.
However, in large and complex IoT systems like the smart city or smart industry which …
However, in large and complex IoT systems like the smart city or smart industry which …
[PDF][PDF] A hybrid-strategy-improved butterfly optimization algorithm applied to the node coverage problem of wireless sensor networks
D Ma, Q Duan - Math. Biosci. Eng, 2022 - aimspress.com
To increase the node coverage of wireless sensor networks (WSN) more effectively, in this
paper, we propose a hybrid-strategy-improved butterfly optimization algorithm (H-BOA) …
paper, we propose a hybrid-strategy-improved butterfly optimization algorithm (H-BOA) …