Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks

J Wang, Y Zhu - Journal of Network and Computer Applications, 2020 - Elsevier
Abstract Recently Ying and Nayak proposed a multi-server supported lightweight
authentication protocol for 5G networks and confirmed the security of their protocol against …

Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy

Q Jiang, F Wei, S Fu, J Ma, G Li, A Alelaiwi - Nonlinear Dynamics, 2016 - Springer
Due to its high level of security, three-factor authentication combining password, smart card
and biometrics has received much interest in the past decades. Recently, Islam proposed a …

Real-time secure communication for Smart City in high-speed Big Data environment

MM Rathore, A Paul, A Ahmad, N Chilamkurti… - Future Generation …, 2018 - Elsevier
The recent development in the technology brings the concept of Smart City that is achieved
through real-time city related intelligent decisions by analyzing the data harvested from …

A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems

CT Li, CC Lee, CY Weng - Journal of medical systems, 2014 - Springer
Telecare medicine information system (TMIS) is widely used for providing a convenient and
efficient communicating platform between patients at home and physicians at medical …

An IoT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks

WL Tai, YF Chang, WH Li - Journal of Information Security and Applications, 2017 - Elsevier
In 2014, Turkanović et al. applied the Internet of Things (IoT) notion to wireless sensor
networks (WSNs) and proposed a user authentication and key agreement scheme for …

Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps

SKH Islam - Nonlinear Dynamics, 2014 - Springer
With the aim of guaranteeing secure communication through public networks, three-factor
password authentication (TF-PWA) scheme plays a key role in many internet applications …

[HTML][HTML] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation

J Wang, Y Zhu, S Maqbool - Digital Communications and Networks, 2021 - Elsevier
During the past decade, rapid advances in wireless communication technologies have
made it possible for users to access desired services using hand-held devices. Service …

A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security

X Li, J Niu, S Kumari, SKH Islam, F Wu… - Wireless Personal …, 2016 - Springer
The widespread popularity of the computer networks has triggered concerns about
information security. Password-based user authentication with key agreement protocols …

OOS-SSS: An efficient online/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network

C Meshram, CC Lee, SG Meshram, A Meshram - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless sensor network (WSN) is a network system that involves spatially distributed
devices such as wireless sensor nodes. As the data collected by the sensor nodes and …

A new three-party-authenticated key agreement scheme based on chaotic maps without password table

CC Lee, CT Li, ST Chiu, YM Lai - Nonlinear Dynamics, 2015 - Springer
Three-party-authenticated key agreement allows two users to establish a common session
key through a trusted server via an insecure communication channel. Early authenticated …