ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Analysis and enhancement of secure three-factor user authentication using Chebyshev Chaotic Map
Journal of Information Security and Applications
◽
10.1016/j.jisa.2021.102915
◽
2021
◽
Vol 61
◽
pp. 102915
Author(s):
Tanmoy Maitra
◽
Shiwangi Singh
◽
Ritwik Saurabh
◽
Debasis Giri
Keyword(s):
User Authentication
◽
Chaotic Map
◽
Chebyshev Chaotic Map
◽
Three Factor
Download Full-text
Related Documents
Cited By
References
An Improved Three-Factor Session Initiation Protocol Using Chebyshev Chaotic Map
IEEE Access
◽
10.1109/access.2020.3002558
◽
2020
◽
Vol 8
◽
pp. 111265-111277
Author(s):
Xiang-Yu Guo
◽
Da-Zhi Sun
◽
Ying Yang
Keyword(s):
Chaotic Map
◽
Session Initiation Protocol
◽
Chebyshev Chaotic Map
◽
Three Factor
Download Full-text
An Energy Efficient Authentication Scheme based on Chebyshev Chaotic Map for Smart Grid Environments
IEEE Internet of Things Journal
◽
10.1109/jiot.2021.3078175
◽
2021
◽
pp. 1-1
Author(s):
Liping Zhang
◽
Yue Zhu
◽
Wei Ren
◽
Yinghan Wang
◽
Kim-Kwang Raymond Choo
◽
...
Keyword(s):
Smart Grid
◽
Energy Efficient
◽
Chaotic Map
◽
Authentication Scheme
◽
Chebyshev Chaotic Map
◽
Grid Environments
Download Full-text
Novel certificateless Chebyshev chaotic map-based key agreement protocol for advanced metering infrastructure
The Journal of Supercomputing
◽
10.1007/s11227-020-03552-z
◽
2021
◽
Author(s):
Dariush Abbasinezhad-Mood
◽
Arezou Ostad-Sharif
◽
Morteza Nikooghadam
◽
Sayyed Majid Mazinani
Keyword(s):
Key Agreement
◽
Chaotic Map
◽
Advanced Metering Infrastructure
◽
Key Agreement Protocol
◽
Chebyshev Chaotic Map
◽
Advanced Metering
Download Full-text
Applying biometrics to design three-factor remote user authentication scheme with key agreement
Security and Communication Networks
◽
10.1002/sec.767
◽
2013
◽
pp. n/a-n/a
◽
Cited By ~ 7
Author(s):
Xiong Li
◽
Jianwei Niu
◽
Zhibo Wang
◽
Caisen Chen
Keyword(s):
Key Agreement
◽
User Authentication
◽
Authentication Scheme
◽
Remote User Authentication
◽
User Authentication Scheme
◽
Remote User
◽
Three Factor
Download Full-text
Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment
Advances in Intelligent Systems and Computing - Proceedings of International Ethical Hacking Conference 2018
◽
10.1007/978-981-13-1544-2_7
◽
2018
◽
pp. 75-87
◽
Cited By ~ 2
Author(s):
Subhas Barman
◽
Prantik Guha
◽
Rituparna Saha
◽
Soumil Ghosh
Keyword(s):
User Authentication
◽
Authentication Scheme
◽
Remote User Authentication
◽
User Authentication Scheme
◽
Multi Server
◽
Remote User
◽
Three Factor
Download Full-text
Review of robust biometrics based three-factor remote user authentication scheme with key agreement
Applied System Innovation
◽
10.1201/b21811-31
◽
2016
◽
pp. 131-134
Author(s):
T Ngo
◽
T Choe
Keyword(s):
Key Agreement
◽
User Authentication
◽
Authentication Scheme
◽
Remote User Authentication
◽
User Authentication Scheme
◽
Remote User
◽
Three Factor
Download Full-text
Three-Factor User Authentication Method Using Biometrics Challenge Response
Financial Cryptography and Data Security - Lecture Notes in Computer Science
◽
10.1007/978-3-642-39884-1_34
◽
2013
◽
pp. 395-396
◽
Cited By ~ 1
Author(s):
Haruhiko Fujii
◽
Yukio Tsuruoka
Keyword(s):
User Authentication
◽
Three Factor
Download Full-text
MAPMCECCM: a mutual authentication protocol for mobile cloud environment using Chebyshev Chaotic Map
Telecommunication Systems
◽
10.1007/s11235-021-00809-7
◽
2021
◽
Author(s):
Manojkumar Vivekanandan
◽
V. N. Sastry
◽
U. Srinivasulu Reddy
Keyword(s):
Chaotic Map
◽
Mutual Authentication
◽
Authentication Protocol
◽
Mobile Cloud
◽
Cloud Environment
◽
Chebyshev Chaotic Map
◽
Mutual Authentication Protocol
Download Full-text
Three-Factor User-Authentication Protocol for Wireless Sensor Networks—A Review
Algorithms for Intelligent Systems - Proceedings of the International Conference on Paradigms of Communication, Computing and Data Sciences
◽
10.1007/978-981-16-5747-4_11
◽
2022
◽
pp. 123-136
Author(s):
Vaishnavi Mishra
◽
Abhay S. Gandhi
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
User Authentication
◽
Authentication Protocol
◽
Wireless Sensor
◽
Three Factor
Download Full-text
Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks
Lecture Notes in Electrical Engineering - Computational Science and Technology
◽
10.1007/978-981-13-2622-6_5
◽
2018
◽
pp. 49-58
Author(s):
Jihyeon Ryu
◽
Taeui Song
◽
Jongho Moon
◽
Hyoungshick Kim
◽
Dongho Won
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
User Authentication
◽
Authentication Scheme
◽
Wireless Sensor
◽
User Authentication Scheme
◽
Three Factor
◽
Provably Secure
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close