Results 241 to 250 of about 94,144 (269)
Some of the next articles are maybe not open access.
Journal of Medical Systems, 2015
Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to ...
Der-Chyuan, Lou +2 more
openaire +2 more sources
Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to ...
Der-Chyuan, Lou +2 more
openaire +2 more sources
An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps
Chaos, Solitons & Fractals, 2007zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chen, Guo, Chen, Yong, Liao, Xiaofeng
openaire +2 more sources
An Extended Chaotic Maps Based Authenticated Key Agreement Protocol Without Using Password
2016Chaotic maps have been used in the design of cryptosystem due to its excellent properties. Recently, researchers have proposed many authenticated key agreement protocols based on the chaotic maps. However, most of those protocols use the password to achieve the key agreement, and it will lead some security problems.
Xiong Li +3 more
openaire +1 more source
Nonlinear Dynamics, 2015
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lee, Tian-Fu +3 more
openaire +1 more source
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lee, Tian-Fu +3 more
openaire +1 more source
Multimedia Tools and Applications, 2016
With the increase of security requirements, numerous biometrics based authentication schemes that apply the smart card technology are proposed for multimedia medicine information systems in the last several years. Recently, Lu et al. presented a biometrics based authentication and key agreement scheme using extended Chebyshev chaotic maps ...
Chengqi Wang, Xiao Zhang, Zhiming Zheng
openaire +1 more source
With the increase of security requirements, numerous biometrics based authentication schemes that apply the smart card technology are proposed for multimedia medicine information systems in the last several years. Recently, Lu et al. presented a biometrics based authentication and key agreement scheme using extended Chebyshev chaotic maps ...
Chengqi Wang, Xiao Zhang, Zhiming Zheng
openaire +1 more source
Nonlinear Dynamics, 2014
With the aim of guaranteeing secure communication through public networks, three-factor password authentication (TF-PWA) scheme plays a key role in many internet applications. Since in TF-PWA scheme, the communicating entities can mutually authenticate each other and generate a shared session key, which will be used for secure exchange of messages in ...
openaire +1 more source
With the aim of guaranteeing secure communication through public networks, three-factor password authentication (TF-PWA) scheme plays a key role in many internet applications. Since in TF-PWA scheme, the communicating entities can mutually authenticate each other and generate a shared session key, which will be used for secure exchange of messages in ...
openaire +1 more source
V2G authentication and quantum key distribution scheme based on extended chaotic mapping
Journal of Computational Methods in Sciences and EngineeringV2G technology enables bidirectional energy transfer from EVs to the grid. It is possible to use the grid to charge EVs and to use EVs to charge the grid during peak grid hours, thus alleviating the problem of grid load fluctuations and improving grid efficiency. Many traditional authentication protocols have been proposed to protect V2G.
openaire +1 more source
Extended Initial Study on the Performance of Enhanced PSO Algorithm with Lozi Chaotic Map
2013In this paper, it is proposed the utilization of discrete Lozi map based chaos random number generator to enhance the performance of PSO algorithm with inertia weight. Performance tests and results are presented. Results are analyzed and compared with another evolutionary algorithm. Tuning experiment was performed.
Michal Pluhacek +4 more
openaire +1 more source
Security analysis of Three-Factor Authentication Protocol Based on Extended Chaotic-Maps
2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development (OTCON), 2023Suresh Devanapalli, Kolloju Phaneendra
openaire +1 more source
IEEE Transactions on Industry Applications, 2023
Chien-Ming Chen, Yiru Hao, Tsu-Yang Wu
openaire +1 more source
Chien-Ming Chen, Yiru Hao, Tsu-Yang Wu
openaire +1 more source

