Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices

S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps

S Kumari, X Li, F Wu, AK Das, H Arshad… - Future Generation …, 2016 - Elsevier
Spread of wireless network technology has opened new doors to utilize sensor technology
in various areas via Wireless Sensor Networks (WSNs). Many authentication protocols for …

[PDF][PDF] Logistic 混沌映射性能分析与改进

陈志刚, 梁涤青, 邓小鸿, 张颖 - 电子与信息学报, 2016 - edit.jeit.ac.cn
混沌系统是基于混沌的数据加密领域的一个重要研究对象, Logistic 混沌映射是最简单和有效的
混沌系统, 被广泛应用在大多数混沌加密算法中, Logistic 映射的安全性成为研究的热点 …

Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy

Q Jiang, F Wei, S Fu, J Ma, G Li, A Alelaiwi - Nonlinear Dynamics, 2016 - Springer
Due to its high level of security, three-factor authentication combining password, smart card
and biometrics has received much interest in the past decades. Recently, Islam proposed a …

Secure-user sign-in authentication for IoT-based eHealth systems

BD Deebak, F Al-Turjman - Complex & Intelligent Systems, 2023 - Springer
Sustainable Computing has advanced the technological evolution of the Internet and
information-based communication technology. It is nowadays emerging in the form of the …

An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring

R Ali, AK Pal, S Kumari, AK Sangaiah, X Li… - Journal of Ambient …, 2024 - Springer
With the rapid growth of wireless medical sensor networks (WMSNs) based healthcare
applications, protecting both the privacy and security from illegitimate users, are major …

An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map

V Sureshkumar, R Amin, MS Obaidat… - Journal of Information …, 2020 - Elsevier
Abstract Telecare Medical Information System (TMIS) is a platform for the patients and the
medical server to communicate and exchange data through the Internet. As the Internet is an …

A secure chaotic map-based remote authentication scheme for telecare medicine information systems

X Li, F Wu, MK Khan, L Xu, J Shen, M Jo - Future Generation Computer …, 2018 - Elsevier
As a kind of e-health notion, telemedicine employs telecommunication and information
technologies to provide remote clinical health care. Telecare medicine information system …

A lightweight mutual and transitive authentication mechanism for IoT network

R Krishnasrija, AK Mandal, A Cortesi - Ad Hoc Networks, 2023 - Elsevier
IoT devices are typically authenticated directly by gateways present in the network.
However, in large and complex IoT systems like the smart city or smart industry which …

[PDF][PDF] A hybrid-strategy-improved butterfly optimization algorithm applied to the node coverage problem of wireless sensor networks

D Ma, Q Duan - Math. Biosci. Eng, 2022 - aimspress.com
To increase the node coverage of wireless sensor networks (WSN) more effectively, in this
paper, we propose a hybrid-strategy-improved butterfly optimization algorithm (H-BOA) …