Results 201 to 210 of about 5,738 (242)
Some of the next articles are maybe not open access.

Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy

Nonlinear Dynamics, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jiang, Qi   +5 more
openaire   +1 more source

An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem

Soft Computing, 2018
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Meshram, Chandrashekhar   +3 more
openaire   +1 more source

Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems

Journal of Medical Systems, 2015
Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to ...
Der-Chyuan, Lou   +2 more
openaire   +2 more sources

Lightweight Identity-Based Group Key Agreements Using Extended Chaotic Maps for Wireless Sensor Networks

IEEE Sensors Journal, 2019
Group key agreements (GKA) enable a group of sensor nodes in wireless sensor networks (WSNs) to negotiate a common secret key and to establish a secure communication channel using this secret key. Due to hardware limitations, sensor nodes cannot perform heavy computations. Therefore, lightweight authentication schemes for GKA are required in WSNs. This
Tian-Fu Lee, Meriske Chen
openaire   +1 more source

An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps

Chaos, Solitons & Fractals, 2007
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chen, Guo, Chen, Yong, Liao, Xiaofeng
openaire   +2 more sources

An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password

2016
Chaotic maps have been used in the design of cryptosystem due to its excellent properties. Recently, researchers have proposed many authenticated key agreement protocols based on the chaotic maps. However, most of those protocols use the password to achieve the key agreement, and it will lead some security problems.
Xiong Li   +3 more
openaire   +1 more source

Provably secure extended chaotic map-based three-party key agreement protocols using password authentication

Nonlinear Dynamics, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lee, Tian-Fu   +3 more
openaire   +1 more source

An improved biometrics based authentication scheme using extended chaotic maps for multimedia medicine information systems

Multimedia Tools and Applications, 2016
With the increase of security requirements, numerous biometrics based authentication schemes that apply the smart card technology are proposed for multimedia medicine information systems in the last several years. Recently, Lu et al. presented a biometrics based authentication and key agreement scheme using extended Chebyshev chaotic maps ...
Chengqi Wang, Xiao Zhang, Zhiming Zheng
openaire   +1 more source

A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps

Nonlinear Dynamics, 2012
Recently, biometric-based remote user authentication schemes along with passwords have drawn considerable attention in research. In 2011, Das proposed an improvement on an efficient biometric-based remote user authentication scheme using smart cards and claimed his scheme could resist various attacks.
Cheng-Chi Lee, Che-Wei Hsu
openaire   +1 more source

Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps

Journal of Medical Systems, 2015
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server.
Yanrong, Lu   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy