Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks
J Wang, Y Zhu - Journal of Network and Computer Applications, 2020 - Elsevier
Abstract Recently Ying and Nayak proposed a multi-server supported lightweight
authentication protocol for 5G networks and confirmed the security of their protocol against …
authentication protocol for 5G networks and confirmed the security of their protocol against …
Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
Q Jiang, F Wei, S Fu, J Ma, G Li, A Alelaiwi - Nonlinear Dynamics, 2016 - Springer
Due to its high level of security, three-factor authentication combining password, smart card
and biometrics has received much interest in the past decades. Recently, Islam proposed a …
and biometrics has received much interest in the past decades. Recently, Islam proposed a …
Real-time secure communication for Smart City in high-speed Big Data environment
The recent development in the technology brings the concept of Smart City that is achieved
through real-time city related intelligent decisions by analyzing the data harvested from …
through real-time city related intelligent decisions by analyzing the data harvested from …
A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
Telecare medicine information system (TMIS) is widely used for providing a convenient and
efficient communicating platform between patients at home and physicians at medical …
efficient communicating platform between patients at home and physicians at medical …
An IoT notion–based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks
WL Tai, YF Chang, WH Li - Journal of Information Security and Applications, 2017 - Elsevier
In 2014, Turkanović et al. applied the Internet of Things (IoT) notion to wireless sensor
networks (WSNs) and proposed a user authentication and key agreement scheme for …
networks (WSNs) and proposed a user authentication and key agreement scheme for …
Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps
SKH Islam - Nonlinear Dynamics, 2014 - Springer
With the aim of guaranteeing secure communication through public networks, three-factor
password authentication (TF-PWA) scheme plays a key role in many internet applications …
password authentication (TF-PWA) scheme plays a key role in many internet applications …
[HTML][HTML] An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
J Wang, Y Zhu, S Maqbool - Digital Communications and Networks, 2021 - Elsevier
During the past decade, rapid advances in wireless communication technologies have
made it possible for users to access desired services using hand-held devices. Service …
made it possible for users to access desired services using hand-held devices. Service …
A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security
The widespread popularity of the computer networks has triggered concerns about
information security. Password-based user authentication with key agreement protocols …
information security. Password-based user authentication with key agreement protocols …
OOS-SSS: An efficient online/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network
Wireless sensor network (WSN) is a network system that involves spatially distributed
devices such as wireless sensor nodes. As the data collected by the sensor nodes and …
devices such as wireless sensor nodes. As the data collected by the sensor nodes and …
A new three-party-authenticated key agreement scheme based on chaotic maps without password table
Three-party-authenticated key agreement allows two users to establish a common session
key through a trusted server via an insecure communication channel. Early authenticated …
key through a trusted server via an insecure communication channel. Early authenticated …