Results 201 to 210 of about 5,738 (242)
Some of the next articles are maybe not open access.
Nonlinear Dynamics, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jiang, Qi +5 more
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jiang, Qi +5 more
openaire +1 more source
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
Soft Computing, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Meshram, Chandrashekhar +3 more
openaire +1 more source
Journal of Medical Systems, 2015
Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to ...
Der-Chyuan, Lou +2 more
openaire +2 more sources
Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to ...
Der-Chyuan, Lou +2 more
openaire +2 more sources
IEEE Sensors Journal, 2019
Group key agreements (GKA) enable a group of sensor nodes in wireless sensor networks (WSNs) to negotiate a common secret key and to establish a secure communication channel using this secret key. Due to hardware limitations, sensor nodes cannot perform heavy computations. Therefore, lightweight authentication schemes for GKA are required in WSNs. This
Tian-Fu Lee, Meriske Chen
openaire +1 more source
Group key agreements (GKA) enable a group of sensor nodes in wireless sensor networks (WSNs) to negotiate a common secret key and to establish a secure communication channel using this secret key. Due to hardware limitations, sensor nodes cannot perform heavy computations. Therefore, lightweight authentication schemes for GKA are required in WSNs. This
Tian-Fu Lee, Meriske Chen
openaire +1 more source
An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
Chaos, Solitons & Fractals, 2007zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chen, Guo, Chen, Yong, Liao, Xiaofeng
openaire +2 more sources
An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password
2016Chaotic maps have been used in the design of cryptosystem due to its excellent properties. Recently, researchers have proposed many authenticated key agreement protocols based on the chaotic maps. However, most of those protocols use the password to achieve the key agreement, and it will lead some security problems.
Xiong Li +3 more
openaire +1 more source
Nonlinear Dynamics, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lee, Tian-Fu +3 more
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lee, Tian-Fu +3 more
openaire +1 more source
Multimedia Tools and Applications, 2016
With the increase of security requirements, numerous biometrics based authentication schemes that apply the smart card technology are proposed for multimedia medicine information systems in the last several years. Recently, Lu et al. presented a biometrics based authentication and key agreement scheme using extended Chebyshev chaotic maps ...
Chengqi Wang, Xiao Zhang, Zhiming Zheng
openaire +1 more source
With the increase of security requirements, numerous biometrics based authentication schemes that apply the smart card technology are proposed for multimedia medicine information systems in the last several years. Recently, Lu et al. presented a biometrics based authentication and key agreement scheme using extended Chebyshev chaotic maps ...
Chengqi Wang, Xiao Zhang, Zhiming Zheng
openaire +1 more source
Nonlinear Dynamics, 2012
Recently, biometric-based remote user authentication schemes along with passwords have drawn considerable attention in research. In 2011, Das proposed an improvement on an efficient biometric-based remote user authentication scheme using smart cards and claimed his scheme could resist various attacks.
Cheng-Chi Lee, Che-Wei Hsu
openaire +1 more source
Recently, biometric-based remote user authentication schemes along with passwords have drawn considerable attention in research. In 2011, Das proposed an improvement on an efficient biometric-based remote user authentication scheme using smart cards and claimed his scheme could resist various attacks.
Cheng-Chi Lee, Che-Wei Hsu
openaire +1 more source
Journal of Medical Systems, 2015
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server.
Yanrong, Lu +4 more
openaire +2 more sources
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server.
Yanrong, Lu +4 more
openaire +2 more sources

