Results 1 to 10 of about 5,738 (242)

Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps. [PDF]

open access: yesPLoS ONE, 2017
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card.
Tian-Fu Lee   +3 more
doaj   +5 more sources

An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity. [PDF]

open access: yesPLoS ONE, 2016
User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network.
Yanrong Lu   +3 more
doaj   +6 more sources

A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting [PDF]

open access: yesSensors, 2017
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless
Tsung-Hung Lin   +3 more
doaj   +5 more sources

Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps. [PDF]

open access: yesPLoS ONE, 2018
Recently, Lu et al. claimed that Xie et al.'s three-party password-authenticated key agreement protocol (3PAKA) using chaotic maps has three security vulnerabilities; in particular, it cannot resist offline password guessing attack, Bergamo et al.'s ...
Qi Xie   +4 more
doaj   +5 more sources

Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks [PDF]

open access: yesSensors, 2015
A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials.
Tian-Fu Lee
doaj   +5 more sources

Blockchain-Based Healthcare Information Preservation Using Extended Chaotic Maps for HIPAA Privacy/Security Regulations [PDF]

open access: yesApplied Sciences, 2021
A healthcare information system allows patients and other users to remotely login to medical services to access health data through the Internet. To protect the privacy of patients and security over the public network, secure communication is required ...
Tian-Fu Lee, I-Pin Chang, Ting-Shun Kung
doaj   +2 more sources

Extended Chaotic-Map-Based User Authentication and Key Agreement for HIPAA Privacy/Security Regulations

open access: yesApplied Sciences, 2022
Background: The US government has enacted the Health Insurance Portability and Accountability Act (HIPAA), in which patient control over electronic protected health information is a major issue of concern.
Yi-Pei Hsieh   +3 more
doaj   +2 more sources

Chaotic analysis, hopf bifurcation and collision of optical periodic solitons in (2+1)-dimensional degenerated Biswas–Milovic equation with Kerr law of nonlinearity [PDF]

open access: yesScientific Reports
The main aim of this research study is to examine optical soliton phenomena in a (2+1)-dimensional Schrödinger class nonlinear model that degenerates from Biswas-Milovic equation (BME) using Riccati modified extended simple equation method (RMESEM). This
M. Mossa Al-sawalha   +3 more
doaj   +2 more sources

Analysis of Chaotic Dynamics by the Extended Entropic Chaos Degree

open access: yesEntropy, 2022
The Lyapunov exponent is the most-well-known measure for quantifying chaos in a dynamical system. However, its computation for any time series without information regarding a dynamical system is challenging because the Jacobian matrix of the map ...
Kei Inoue
doaj   +1 more source

Efficient Extended Chaotic Map-Based IBE for Industrial Environment

open access: yesIEEE Access, 2022
Identity-based encryption is a public key-based method of encryption that enables communicating identities to use some individual and unique information, such as their physical IP addresses and MAC addresses, to identify them and as public keys. The scheme does not require the extra device to store long-term public keys. So, it is convenient for use in
Tian-Fu Lee, Yi-Chien Huang
openaire   +2 more sources

Home - About - Disclaimer - Privacy