Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy

Q Jiang, F Wei, S Fu, J Ma, G Li, A Alelaiwi - Nonlinear Dynamics, 2016‏ - Springer
Due to its high level of security, three-factor authentication combining password, smart card
and biometrics has received much interest in the past decades. Recently, Islam proposed a …

An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps

MS Farash, MA Attari - Nonlinear Dynamics, 2014‏ - Springer
Three-party password-based authenticated key exchange (3PAKE) protocols allow two
clients to establish a secure session key through a server over an insecure channel …

A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems

CT Li, CC Lee, CY Weng - Journal of medical systems, 2014‏ - Springer
Telecare medicine information system (TMIS) is widely used for providing a convenient and
efficient communicating platform between patients at home and physicians at medical …

[PDF][PDF] On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol.

CM Chen, L Xu, TY Wu, CR Li - J. Netw. Intell., 2016‏ - bit.kuas.edu.tw
Chaotic map has been receiving increasing attention in the cryptographic literature. There
are various scholars working on a particular type of authenticated key exchange protocol …

Chaotic map based mobile dynamic ID authenticated key agreement scheme

HY Lin - Wireless Personal Communications, 2014‏ - Springer
When it comes to key agreement protocol, mutual authentication is regarded as a crucial
security requirement. Yet, conventional authenticated key agreement using static ID cannot …

Chaotic maps-based three-party password-authenticated key agreement scheme

Q **e, J Zhao, X Yu - Nonlinear Dynamics, 2013‏ - Springer
Since chaos theory related to cryptography has been addressed widely, many chaotic maps
based two-party password-authenticated key agreement (2PAKA) schemes have been …

Secure and efficient user authentication scheme based on password and smart card for multiserver environment

Y Zhao, S Li, L Jiang - Security and Communication Networks, 2018‏ - Wiley Online Library
The rapid development of information and network technologies motivates the emergence of
various new computing paradigms, such as distributed computing, cloud computing, and …

Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps

SKH Islam - Nonlinear Dynamics, 2014‏ - Springer
With the aim of guaranteeing secure communication through public networks, three-factor
password authentication (TF-PWA) scheme plays a key role in many internet applications …

A new three-party-authenticated key agreement scheme based on chaotic maps without password table

CC Lee, CT Li, ST Chiu, YM Lai - Nonlinear Dynamics, 2015‏ - Springer
Three-party-authenticated key agreement allows two users to establish a common session
key through a trusted server via an insecure communication channel. Early authenticated …

Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps

SKH Islam - Information Sciences, 2015‏ - Elsevier
Recently, the theory and application of Chebyshev polynomials have been studied
extremely by the cryptographic research community; many symmetric and asymmetric …