Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
With the wide deployment of new computing paradigms, such as cloud computing and edge computing, the people can access services provided by remote servers more conveniently via the Internet. To preserve the security of those messages transmitted over the public channel, remote user authentication pr...
Saved in:
Main Authors: | Yan Zhao, Shiming Li, Liehui Jiang, Tieming Liu |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2019-04-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147719842152 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A ZigBee network anonymous authentication scheme based on Chebyshev chaotic mapping and CRT
by: Wei LIAO, et al.
Published: (2023-12-01) -
A Remote User Security Authentication Scheme Using Smart Card and Password Protection for WSN
by: Liping Liu
Published: (2015-12-01) -
An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
by: Yousheng Zhou, et al.
Published: (2016-01-01) -
Multi-server identity authentication scheme based on biometric and chaotic maps
by: Jianwu ZHANG, et al.
Published: (2017-02-01) -
Efficient three-party authenticated key agreement protocol based on chaotic map
by: Xiong LI, et al.
Published: (2016-06-01)