Results 221 to 230 of about 94,144 (269)
Hybrid Cuckoo Search-Bees Algorithm with Memristive Chaotic Initialization for Cryptographically Strong S-Box Generation. [PDF]
Akyol S.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
An extended chaotic maps-based key agreement protocol with user anonymity
Nonlinear Dynamics, 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lee, Cheng-Chi +3 more
openaire +3 more sources
Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
Nonlinear Dynamics, 2012zbMATH Open Web Interface contents unavailable due to conflicting licenses.
He, Debiao, Chen, Yitao, Chen, Jianhua
openaire +4 more sources
An efficient online/offline ID-based short signature procedure using extended chaotic maps
Soft Computing, 2018zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Meshram, Chandrashekhar +2 more
openaire +3 more sources
IEEE Sensors Journal, 2019
Group key agreements (GKA) enable a group of sensor nodes in wireless sensor networks (WSNs) to negotiate a common secret key and to establish a secure communication channel using this secret key. Due to hardware limitations, sensor nodes cannot perform heavy computations. Therefore, lightweight authentication schemes for GKA are required in WSNs. This
Tian-Fu Lee, Meriske Chen
openaire +3 more sources
Group key agreements (GKA) enable a group of sensor nodes in wireless sensor networks (WSNs) to negotiate a common secret key and to establish a secure communication channel using this secret key. Due to hardware limitations, sensor nodes cannot perform heavy computations. Therefore, lightweight authentication schemes for GKA are required in WSNs. This
Tian-Fu Lee, Meriske Chen
openaire +3 more sources
Nonlinear Dynamics, 2012
Recently, biometric-based remote user authentication schemes along with passwords have drawn considerable attention in research. In 2011, Das proposed an improvement on an efficient biometric-based remote user authentication scheme using smart cards and claimed his scheme could resist various attacks.
Cheng-Chi Lee, Che-Wei Hsu
openaire +3 more sources
Recently, biometric-based remote user authentication schemes along with passwords have drawn considerable attention in research. In 2011, Das proposed an improvement on an efficient biometric-based remote user authentication scheme using smart cards and claimed his scheme could resist various attacks.
Cheng-Chi Lee, Che-Wei Hsu
openaire +3 more sources
Journal of Medical Systems, 2015
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server.
Yanrong, Lu +4 more
openaire +4 more sources
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server.
Yanrong, Lu +4 more
openaire +4 more sources
Ultra Super Fast Authentication Protocol for Electric Vehicle Charging Using Extended Chaotic Maps
IEEE Transactions on Industry Applications, 2022Weizheng Wang +5 more
openaire +3 more sources
ID-Based Signcryption Scheme Using Extended Chaotic Maps
2016 International Symposium on Computer, Consumer and Control (IS3C), 2016Recently, the chaotic public-key cryptography attracts much attention of researchers, due to the great characters of chaotic maps. With the security superiorities and computation efficiencies of chaotic map over other cryptosystems, in this paper, a novel Identity-based signcryption scheme is proposed using extended chaotic maps.
Wang Caifen, Kang Burong
openaire +1 more source

