4.4 Article

Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'

Related references

Note: Only part of the references are listed.
Article Health Care Sciences & Services

An Improved Anonymous Authentication Scheme for Telecare Medical Information Systems

Fengtong Wen et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Review Telecommunications

Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme

Han-Yu Lin

WIRELESS PERSONAL COMMUNICATIONS (2014)

Article Telecommunications

A Secure and Efficient Authentication Scheme for E-coupon Systems

Ching-Chun Chang et al.

WIRELESS PERSONAL COMMUNICATIONS (2014)

Article Telecommunications

Analysis and Improvement of a Robust Smart Card Based-Authentication Scheme for Multi-Server Architecture

Dianli Guo et al.

WIRELESS PERSONAL COMMUNICATIONS (2014)

Article Computer Science, Information Systems

An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks

Xuelei Li et al.

INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT (2013)

Article Engineering, Mechanical

A chaotic maps-based authenticated key agreement protocol with strong anonymity

Zuowen Tan

NONLINEAR DYNAMICS (2013)

Article Telecommunications

A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility Networks

Fengtong Wen et al.

WIRELESS PERSONAL COMMUNICATIONS (2013)

Article Mathematics, Applied

Security improvement on an anonymous key agreement protocol based on chaotic maps

Kaiping Xue et al.

COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2012)

Article Engineering, Mechanical

An extended chaotic maps-based key agreement protocol with user anonymity

Cheng-Chi Lee et al.

NONLINEAR DYNAMICS (2012)

Article Engineering, Mechanical

Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol

Debiao He et al.

NONLINEAR DYNAMICS (2012)

Article Mathematics, Applied

An anonymous key agreement protocol based on chaotic maps

Yujun Niu et al.

COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2011)

Article Computer Science, Information Systems

Cryptanalysis and security enhancement of a 'more efficient & secure dynamic ID-based remote user authentication scheme'

Muhammad Khurram Khan et al.

COMPUTER COMMUNICATIONS (2011)

Article Mathematics, Applied

Provably secure randomized blind signature scheme based on bilinear pairing

Chun-I Fan et al.

COMPUTERS & MATHEMATICS WITH APPLICATIONS (2010)

Article Computer Science, Information Systems

A novel key agreement protocol based on chaotic maps

Di Xiao et al.

INFORMATION SCIENCES (2007)

Article Engineering, Electrical & Electronic

Security of public-key cryptosystems based on Chebyshev polynomials

P Bergamo et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS (2005)