메뉴 건너뛰기




Volumn 4, Issue 2, 2013, Pages 99-109

Chaotic maps-based mutual authentication and key agreement using smart cards for wireless communications

Author keywords

Authentication; Chaotic maps; Key agreement; Smart cards; Wireless communications

Indexed keywords

CHAOTIC MAP; COMPUTATIONAL COSTS; KEY AGREEMENT; MUTUAL AUTHENTICATION; PERFORMANCE ANALYSIS; SCALAR MULTIPLICATION; USER AUTHENTICATION; WIRELESS COMMUNICATIONS;

EID: 84874912084     PISSN: 20734212     EISSN: 20734239     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (27)

References (24)
  • 1
    • 28044451335 scopus 로고    scopus 로고
    • Robust remote authentication scheme with smart cards
    • C. I. Fan, Y. C. Chan, and Z. K. Zhang, Robust remote authentication scheme with smart cards, Journal of Computers & Security, vol. 42, no. 8, pp. 619-628, 2005.
    • (2005) Journal of Computers & Security , vol.42 , Issue.8 , pp. 619-628
    • Fan, C.I.1    Chan, Y.C.2    Zhang, Z.K.3
  • 2
    • 77958150942 scopus 로고    scopus 로고
    • Secure group key agreement protocol based on chaotic hash
    • X. F. Guo, and J. S. Zhang, Secure group key agreement protocol based on chaotic hash, Journal of Information Sciences, Vol. 180, no. 20, pp. 4069-4074, 2010.
    • (2010) Journal of Information Sciences , vol.180 , Issue.20 , pp. 4069-4074
    • Guo, X.F.1    Zhang, J.S.2
  • 3
    • 78751648745 scopus 로고    scopus 로고
    • A strong user authentication scheme with anonymity for wireless communications
    • D. J. He, M. D. Ma, Y. Zhang, C. Chen, and J. J. Bu, A strong user authentication scheme with anonymity for wireless communications, Journal of Computer Communications, Vol. 34, no. 3, pp. 367-374, 2011.
    • (2011) Journal of Computer Communications , vol.34 , Issue.3 , pp. 367-374
    • He, D.J.1    Ma, M.D.2    Zhang, Y.3    Chen, C.4    Bu, J.J.5
  • 4
    • 71649104505 scopus 로고    scopus 로고
    • DoS resistant ID-based password authentication scheme using smart cards
    • M. S. Hwang, S. K. Chong, and T. Y. Chen, DoS resistant ID-based password authentication scheme using smart cards, Journal of Systems and Software, vol. 83, no. 1, pp. 163-172, 2010.
    • (2010) Journal of Systems and Software , vol.83 , Issue.1 , pp. 163-172
    • Hwang, M.S.1    Chong, S.K.2    Chen, T.Y.3
  • 5
    • 62549133356 scopus 로고    scopus 로고
    • Robust and efficient password-authenticated key agreement using smart card
    • W. S. Juang, S. T. Chen, and H. T. Liaw, Robust and efficient password-authenticated key agreement using smart card, IEEE Trans. Industrial Electronics, vol. 55, no. 6, pp. 2551-2556, 2008.
    • (2008) IEEE Trans. Industrial Electronics , vol.55 , Issue.6 , pp. 2551-2556
    • Juang, W.S.1    Chen, S.T.2    Liaw, H.T.3
  • 6
    • 33750133438 scopus 로고    scopus 로고
    • Security enhancement on a new authentication scheme with anonymity for wireless environments
    • C. C. Lee, M. S. Hwang, and I. E. Liao, Security enhancement on a new authentication scheme with anonymity for wireless environments, IEEE Trans. Industrial Electronics, vol. 53, no. 5, pp. 1683-1686, 2006.
    • (2006) IEEE Trans. Industrial Electronics , vol.53 , Issue.5 , pp. 1683-1686
    • Lee, C.C.1    Hwang, M.S.2    Liao, I.E.3
  • 7
    • 67649184080 scopus 로고    scopus 로고
    • Security flaw of authentication scheme with anonymity for wireless communications
    • J. S. Lee, J. H. Chang, and D. H. Lee, Security flaw of authentication scheme with anonymity for wireless communications, Journal of IEEE Communications Letters, vol. 13, no. 5, pp. 292-293, 2009.
    • (2009) Journal of IEEE Communications Letters , vol.13 , Issue.5 , pp. 292-293
    • Lee, J.S.1    Chang, J.H.2    Lee, D.H.3
  • 8
    • 82755189733 scopus 로고    scopus 로고
    • A novel user authentication and privacy preserving scheme with smart cards for wireless communications
    • C. T. Li and C. C. Lee, A novel user authentication and privacy preserving scheme with smart cards for wireless communications, Journal of Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 35-44, 2012.
    • (2012) Journal of Mathematical and Computer Modelling , vol.55 , Issue.1-2 , pp. 35-44
    • Li, C.T.1    Lee, C.C.2
  • 9
    • 75449106985 scopus 로고    scopus 로고
    • Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards
    • X. X. Li, W. D. Qiu, D. Zheng, K. F. Chen, and J. H. Li, Anonymity enhancement on robust and efficient password-authenticated key agreement using smart cards, IEEE Trans. Industrial Electronics, vol. 57, no. 2, pp. 793-800, 2010.
    • (2010) IEEE Trans. Industrial Electronics , vol.57 , Issue.2 , pp. 793-800
    • Li, X.X.1    Qiu, W.D.2    Zheng, D.3    Chen, K.F.4    Li, J.H.5
  • 11
    • 67649386419 scopus 로고    scopus 로고
    • Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards
    • D. Z. Sun, J. P. Huai, J. Z. Sun, J. X. Li, J. W. Zhang, and Z. Y. Feng, Improvements of Juang et al.'s password-authenticated key agreement scheme using smart cards, IEEE Trans. Industrial Electronics, vol. 56, no. 6, pp. 2284-2291, 2009.
    • (2009) IEEE Trans. Industrial Electronics , vol.56 , Issue.6 , pp. 2284-2291
    • Sun, D.Z.1    Huai, J.P.2    Sun, J.Z.3    Li, J.X.4    Zhang, J.W.5    Feng, Z.Y.6
  • 12
    • 33750489725 scopus 로고    scopus 로고
    • Security of public key encryption technique based on multiple chaotic system
    • K. Wang, W. J. Pei, L. H. Zou, Y. M. Cheung, and Z. Y. HE, Security of public key encryption technique based on multiple chaotic system, Journal of Physics Letters A, vol. 360, no. 2, pp. 259-262, 2006.
    • (2006) Journal of Physics Letters A , vol.360 , Issue.2 , pp. 259-262
    • Wang, K.1    Pei, W.J.2    Zou, L.H.3    Cheung, Y.M.4    He, Z.Y.5
  • 14
    • 84858082073 scopus 로고    scopus 로고
    • An improved dynamic ID-based remote user authentication with key agreement scheme
    • F. T. Wen, and X. L. Li, An improved dynamic ID-based remote user authentication with key agreement scheme, Journal of Computers and Electrical Engineering, vol. 38 no. 2, pp. 381-387, 2012.
    • (2012) Journal of Computers and Electrical Engineering , vol.38 , Issue.2 , pp. 381-387
    • Wen, F.T.1    Li, X.L.2
  • 15
    • 54949140749 scopus 로고    scopus 로고
    • A secure authentication scheme with anonymity for wireless communications
    • C. C. Wu, W. B. Lee, and W. J. Tsaur, A secure authentication scheme with anonymity for wireless communications, Journal of IEEE Communications Letters, vol. 12, no. 10, pp. 722-723, 2008.
    • (2008) Journal of IEEE Communications Letters , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 16
    • 33751227507 scopus 로고    scopus 로고
    • A novel key agreement protocol based on chaotic maps
    • D. Xiao, X. F. Liao, and S. J. Deng, A novel key agreement protocol based on chaotic maps, Journal of Information Sciences, vol. 177, no. 4, pp. 1136-1142, 2007.
    • (2007) Journal of Information Sciences , vol.177 , Issue.4 , pp. 1136-1142
    • Xiao, D.1    Liao, X.F.2    Deng, S.J.3
  • 17
    • 38349025681 scopus 로고    scopus 로고
    • Using time-stamp to improve the security of a chaotic maps- based key agreement protocol
    • D. Xiao, X. F. Liao, and S. J. Deng, Using time-stamp to improve the security of a chaotic maps- based key agreement protocol, Journal of Information Sciences, vol. 178, no. 6, pp. 1598-1602, 2008.
    • (2008) Journal of Information Sciences , vol.178 , Issue.6 , pp. 1598-1602
    • Xiao, D.1    Liao, X.F.2    Deng, S.J.3
  • 18
    • 6344239137 scopus 로고    scopus 로고
    • An efficient entire chaos-based scheme for deniable authenti- cation
    • D. Xiao, X. F. Liao, and K. W. Wong, An efficient entire chaos-based scheme for deniable authenti- cation, Journal of Chaos, Solitons & Fractals, vol. 23, no. 4, pp. 1327-1331, 2005.
    • (2005) Journal of Chaos, Solitons & Fractals , vol.23 , Issue.4 , pp. 1327-1331
    • Xiao, D.1    Liao, X.F.2    Wong, K.W.3
  • 19
    • 78751650071 scopus 로고    scopus 로고
    • An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    • J. Xu, W. T. Zhu, and D. G. Feng, An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks, Journal of Computer Communications, vol. 34, no. 3, pp. 319-325, 2011.
    • (2011) Journal of Computer Communications , vol.34 , Issue.3 , pp. 319-325
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3
  • 20
    • 78049322666 scopus 로고    scopus 로고
    • Two robust remote user authentication protocols using smart cards
    • K. H. Yeh, C. H. Su, N. W. Lo, Y. J. Li, and Y. X. Hung, Two robust remote user authentication protocols using smart cards, Journal of Systems and Software, vol. 83, no. 12, pp. 2556-2565, 2010.
    • (2010) Journal of Systems and Software , vol.83 , Issue.12 , pp. 2556-2565
    • Yeh, K.H.1    Su, C.H.2    Lo, N.W.3    Li, Y.J.4    Hung, Y.X.5
  • 21
    • 78651423836 scopus 로고    scopus 로고
    • An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map
    • E. J. Yoon, and II. S. Jeon, An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map, Journal of Communications in Nonlinear Science and Numerical Simulation, vol. 16, no. 6, pp. 2383-2389, 2011.
    • (2011) Journal of Communications In Nonlinear Science and Numerical Simulation , vol.16 , Issue.6 , pp. 2383-2389
    • Yoon, E.J.1    Jeon, H.S.2
  • 22
    • 79956064800 scopus 로고    scopus 로고
    • A user friendly authentication scheme with anonymity for wireless communications
    • E. J. Yoon, K. Y. Yoo, and K. S. Ha, A user friendly authentication scheme with anonymity for wireless communications, Journal of Computers and Electrical Engineering, vol. 37, no. 3, pp. 356-364, 2011.
    • (2011) Journal of Computers and Electrical Engineering , vol.37 , Issue.3 , pp. 356-364
    • Yoon, E.J.1    Yoo, K.Y.2    Ha, K.S.3
  • 23
    • 40249103088 scopus 로고    scopus 로고
    • Cryptanalysis of the public key encryption based on multiple chaotic systems
    • L. H. Zhang, Cryptanalysis of the public key encryption based on multiple chaotic systems, Journal of Chaos, Solitons & Fractals, vol. 37, no. 3, pp. 669-674, 2008.
    • (2008) Journal of Chaos, Solitons & Fractals , vol.37 , Issue.3 , pp. 669-674
    • Zhang, L.H.1
  • 24
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • J. M. Zhu, and J. F. Ma, A new authentication scheme with anonymity for wireless environments, IEEE Trans. Consumer Electronics, vol. 50, no. 1, pp. 231-235, 2004.
    • (2004) IEEE Trans. Consumer Electronics , vol.50 , Issue.1 , pp. 231-235
    • Zhu, J.M.1    Ma, J.F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.