Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps. [PDF]
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card.
Tian-Fu Lee +3 more
doaj +5 more sources
An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity. [PDF]
User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network.
Yanrong Lu +3 more
doaj +6 more sources
A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting [PDF]
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless
Tsung-Hung Lin +3 more
doaj +5 more sources
Security and efficiency enhancement of an anonymous three-party password-authenticated key agreement using extended chaotic maps. [PDF]
Recently, Lu et al. claimed that Xie et al.'s three-party password-authenticated key agreement protocol (3PAKA) using chaotic maps has three security vulnerabilities; in particular, it cannot resist offline password guessing attack, Bergamo et al.'s ...
Qi Xie +4 more
doaj +5 more sources
Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks [PDF]
A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials.
Tian-Fu Lee
doaj +5 more sources
Blockchain-Based Healthcare Information Preservation Using Extended Chaotic Maps for HIPAA Privacy/Security Regulations [PDF]
A healthcare information system allows patients and other users to remotely login to medical services to access health data through the Internet. To protect the privacy of patients and security over the public network, secure communication is required ...
Tian-Fu Lee, I-Pin Chang, Ting-Shun Kung
doaj +2 more sources
Background: The US government has enacted the Health Insurance Portability and Accountability Act (HIPAA), in which patient control over electronic protected health information is a major issue of concern.
Yi-Pei Hsieh +3 more
doaj +2 more sources
Chaotic analysis, hopf bifurcation and collision of optical periodic solitons in (2+1)-dimensional degenerated Biswas–Milovic equation with Kerr law of nonlinearity [PDF]
The main aim of this research study is to examine optical soliton phenomena in a (2+1)-dimensional Schrödinger class nonlinear model that degenerates from Biswas-Milovic equation (BME) using Riccati modified extended simple equation method (RMESEM). This
M. Mossa Al-sawalha +3 more
doaj +2 more sources
Analysis of Chaotic Dynamics by the Extended Entropic Chaos Degree
The Lyapunov exponent is the most-well-known measure for quantifying chaos in a dynamical system. However, its computation for any time series without information regarding a dynamical system is challenging because the Jacobian matrix of the map ...
Kei Inoue
doaj +1 more source
Efficient Extended Chaotic Map-Based IBE for Industrial Environment
Identity-based encryption is a public key-based method of encryption that enables communicating identities to use some individual and unique information, such as their physical IP addresses and MAC addresses, to identify them and as public keys. The scheme does not require the extra device to store long-term public keys. So, it is convenient for use in
Tian-Fu Lee, Yi-Chien Huang
openaire +2 more sources

