메뉴 건너뛰기




Volumn 83, Issue 4, 2016, Pages 2085-2101

Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy

Author keywords

Anonymity; Authentication; Biometrics; Chaotic map; Key agreement; Password; Privacy; Smart card

Indexed keywords

BIOMETRICS; CHAOTIC SYSTEMS; COMPUTATION THEORY; DATA PRIVACY; SMART CARDS; TRANSPORTATION;

EID: 84958124876     PISSN: 0924090X     EISSN: 1573269X     Source Type: Journal    
DOI: 10.1007/s11071-015-2467-5     Document Type: Article
Times cited : (104)

References (54)
  • 1
    • 84962448916 scopus 로고    scopus 로고
    • A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
    • Xia, Z., Wang, X., Sun, X., Wang, Q.: A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans. Parallel Distrib. Syst. (2015). doi:10.1109/TPDS.2015.2401003
    • (2015) IEEE Trans. Parallel Distrib. Syst.
    • Xia, Z.1    Wang, X.2    Sun, X.3    Wang, Q.4
  • 2
    • 84922280033 scopus 로고    scopus 로고
    • Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing
    • Fu, Z., Sun, X., Liu, Q., Zhou, L., Shu, J.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. E98–B(1), 190–200 (2015)
    • (2015) IEICE Trans. Commun. , vol.E98–B , Issue.1 , pp. 190-200
    • Fu, Z.1    Sun, X.2    Liu, Q.3    Zhou, L.4    Shu, J.5
  • 3
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)
    • (2015) J. Internet Technol. , vol.16 , Issue.2 , pp. 317-323
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5
  • 4
    • 84916883747 scopus 로고    scopus 로고
    • A variable threshold-value authentication architecture for wireless mesh networks
    • Guo, P., Wang, J., Li, B., Lee, S.: A variable threshold-value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–936 (2014)
    • (2014) J. Internet Technol. , vol.15 , Issue.6 , pp. 929-936
    • Guo, P.1    Wang, J.2    Li, B.3    Lee, S.4
  • 5
    • 84906345040 scopus 로고    scopus 로고
    • A secure and effective anonymous authentication scheme for roaming service in global mobility networks
    • Zhao, D., Peng, H., Li, L., Yang, Y.: A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel. Pers. Commun. 78(1), 247–269 (2014)
    • (2014) Wirel. Pers. Commun. , vol.78 , Issue.1 , pp. 247-269
    • Zhao, D.1    Peng, H.2    Li, L.3    Yang, Y.4
  • 6
    • 84975275069 scopus 로고    scopus 로고
    • Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
    • Wang, D., He, D., Wang, P., Chu, C.-H.: Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans. Depend. Secure Comput. 12(4), 428–442 (2015). doi:10.1109/TDSC.2014.2355850
    • (2015) IEEE Trans. Depend. Secure Comput. , vol.12 , Issue.4 , pp. 428-442
    • Wang, D.1    He, D.2    Wang, P.3    Chu, C.-H.4
  • 7
    • 84938203681 scopus 로고    scopus 로고
    • Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity
    • Wang, D., Wang, N., Wang, P., Qing, S.: Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321, 162–178 (2015). doi:10.1016/j.ins.2015.03.070
    • (2015) Inf. Sci. , vol.321 , pp. 162-178
    • Wang, D.1    Wang, N.2    Wang, P.3    Qing, S.4
  • 8
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens, and biometrics for user authentication
    • O’Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021–2040 (2003)
    • (2003) Proc. IEEE , vol.91 , Issue.12 , pp. 2021-2040
    • O’Gorman, L.1
  • 9
    • 84911059606 scopus 로고    scopus 로고
    • An efficient and improved generic framework for three-factor authentication with provably secure instantiation
    • Yu, J., Wang, G., Mu, Y., Gao, W.: An efficient and improved generic framework for three-factor authentication with provably secure instantiation. IEEE Trans. Inf. Forensics Secur. 9(12), 2302–2313 (2014). doi:10.1109/TIFS.2014.2362979
    • (2014) IEEE Trans. Inf. Forensics Secur. , vol.9 , Issue.12 , pp. 2302-2313
    • Yu, J.1    Wang, G.2    Mu, Y.3    Gao, W.4
  • 10
    • 79959689122 scopus 로고    scopus 로고
    • A generic framework for three-factor authentication: preserving security and privacy in distributed systems
    • Huang, X., Xiang, Y., Chonka, A., Zhou, J., Deng, R.H.: A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans. Parallel Distrib. Syst. 22(8), 1390–1397 (2011)
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.8 , pp. 1390-1397
    • Huang, X.1    Xiang, Y.2    Chonka, A.3    Zhou, J.4    Deng, R.H.5
  • 11
    • 4043139259 scopus 로고    scopus 로고
    • A flexible biometrics remote user authentication scheme
    • Lin, C.H., Lai, Y.Y.C.H.: A flexible biometrics remote user authentication scheme. Comput. Stand. Interfaces 27, 19–23 (2004)
    • (2004) Comput. Stand. Interfaces , vol.27 , pp. 19-23
    • Lin, C.H.1    Lai, Y.Y.C.H.2
  • 12
    • 33751167604 scopus 로고    scopus 로고
    • Improving the security of ‘a flexible biometrics remote user authentication scheme’
    • Khan, M.K., Zhang, J.S.: Improving the security of ‘a flexible biometrics remote user authentication scheme’. Comput. Stand. Interfaces 29, 82–85 (2007)
    • (2007) Comput. Stand. Interfaces , vol.29 , pp. 82-85
    • Khan, M.K.1    Zhang, J.S.2
  • 13
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • Li, C.-T., Hwang, M.-S.: An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33, 1–5 (2010)
    • (2010) J. Netw. Comput. Appl. , vol.33 , pp. 1-5
    • Li, C.-T.1    Hwang, M.-S.2
  • 14
    • 78649335192 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a biometric-based remote authentication scheme using smart cards
    • Li, X., Niu, J.W., Ma, J., Wang, W.D., Liu, C.L.: Cryptanalysis and improvement of a biometric-based remote authentication scheme using smart cards. J. Netw. Comput. Appl. 34, 73–79 (2011)
    • (2011) J. Netw. Comput. Appl. , vol.34 , pp. 73-79
    • Li, X.1    Niu, J.W.2    Ma, J.3    Wang, W.D.4    Liu, C.L.5
  • 15
    • 81855227196 scopus 로고    scopus 로고
    • Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards
    • Das, A.K.: Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards. IET Inf. Secur. 5(3), 145–151 (2012)
    • (2012) IET Inf. Secur. , vol.5 , Issue.3 , pp. 145-151
    • Das, A.K.1
  • 16
    • 70450285606 scopus 로고    scopus 로고
    • Provably secure remote truly three factor authentication scheme with privacy protection on biometrics
    • Fan, C.I., Lin, Y.H.: Provably secure remote truly three factor authentication scheme with privacy protection on biometrics. IEEE Trans. Inf. Forensics Secur. 4, 933–945 (2009)
    • (2009) IEEE Trans. Inf. Forensics Secur. , vol.4 , pp. 933-945
    • Fan, C.I.1    Lin, Y.H.2
  • 17
    • 84908157951 scopus 로고    scopus 로고
    • Applying biometrics to design three-factor remote user authentication scheme with key agreement
    • Li, X., Niu, J., Wang, Z., Chen, C.: Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur. Commun. Netw. 7(10), 1488–1497 (2013)
    • (2013) Secur. Commun. Netw. , vol.7 , Issue.10 , pp. 1488-1497
    • Li, X.1    Niu, J.2    Wang, Z.3    Chen, C.4
  • 18
    • 84902189092 scopus 로고    scopus 로고
    • Chaos-order transition in foraging behavior of ants
    • Li, L., Peng, H., Kurths, J., Yang, Y., Schellnhuber, H.J.: Chaos-order transition in foraging behavior of ants. PNAS 111(23), 8392–8397 (2014)
    • (2014) PNAS , vol.111 , Issue.23 , pp. 8392-8397
    • Li, L.1    Peng, H.2    Kurths, J.3    Yang, Y.4    Schellnhuber, H.J.5
  • 19
    • 78049382801 scopus 로고    scopus 로고
    • An anonymous key agreement protocol based on chaotic maps
    • Niu, Y.J., Wang, X.Y.: An anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 16, 1986–1992 (2011)
    • (2011) Commun. Nonlinear Sci. Numer. Simul. , vol.16 , pp. 1986-1992
    • Niu, Y.J.1    Wang, X.Y.2
  • 20
    • 84856430473 scopus 로고    scopus 로고
    • Security improvement on an anonymous key agreement protocol based on chaotic maps
    • Xue, K., Hong, P.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 17, 2969–2977 (2012)
    • (2012) Commun. Nonlinear Sci. Numer. Simul. , vol.17 , pp. 2969-2977
    • Xue, K.1    Hong, P.2
  • 21
    • 84926315405 scopus 로고    scopus 로고
    • Enhancing the security of password authenticated key agreement protocols based on chaotic maps
    • Lee, T.-F.: Enhancing the security of password authenticated key agreement protocols based on chaotic maps. Inf. Sci. 290, 63–71 (2015)
    • (2015) Inf. Sci. , vol.290 , pp. 63-71
    • Lee, T.-F.1
  • 22
    • 84870863840 scopus 로고    scopus 로고
    • A secure chaotic maps-based key agreement protocol without using smart cards
    • Gong, P., Li, P., Shi, W.: A secure chaotic maps-based key agreement protocol without using smart cards. Nonlinear Dyn. 70, 2401–2406 (2012)
    • (2012) Nonlinear Dyn. , vol.70 , pp. 2401-2406
    • Gong, P.1    Li, P.2    Shi, W.3
  • 23
    • 84888643068 scopus 로고    scopus 로고
    • Chaotic maps-based three-party password authenticated key agreement scheme
    • Xie, Q., Tu, X.: Chaotic maps-based three-party password authenticated key agreement scheme. Nonlinear Dyn. 74, 1021–1027 (2013)
    • (2013) Nonlinear Dyn. , vol.74 , pp. 1021-1027
    • Xie, Q.1    Tu, X.2
  • 24
    • 84883751308 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
    • Zhao, F., Gong, P., Li, S., Li, M., Li, P.: Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials. Nonlinear Dyn. 74, 419–427 (2013)
    • (2013) Nonlinear Dyn. , vol.74 , pp. 419-427
    • Zhao, F.1    Gong, P.2    Li, S.3    Li, M.4    Li, P.5
  • 25
    • 84879782333 scopus 로고    scopus 로고
    • A three-party password based authenticated key exchange protocol with user anonymity using extended chaotic maps
    • Lee, C.-C., Li, C.-T., Hsu, C.-W.: A three-party password based authenticated key exchange protocol with user anonymity using extended chaotic maps. Nonlinear Dyn. 73, 125–132 (2013)
    • (2013) Nonlinear Dyn. , vol.73 , pp. 125-132
    • Lee, C.-C.1    Li, C.-T.2    Hsu, C.-W.3
  • 26
    • 84902266968 scopus 로고    scopus 로고
    • An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps
    • Farash, M.S., Attari, M.A.: An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps. Nonlinear Dyn. 77(1), 399–411 (2014). doi:10.1007/s11071-014-1304-6
    • (2014) Nonlinear Dyn. , vol.77 , Issue.1 , pp. 399-411
    • Farash, M.S.1    Attari, M.A.2
  • 27
    • 84901574009 scopus 로고    scopus 로고
    • Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model
    • Lai, H., Orgun, M.A., Xiao, J., Pieprzyk, J., Xue, L., Yang, Y.: Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model. Nonlinear Dyn. 77(4), 1427–1439 (2014)
    • (2014) Nonlinear Dyn. , vol.77 , Issue.4 , pp. 1427-1439
    • Lai, H.1    Orgun, M.A.2    Xiao, J.3    Pieprzyk, J.4    Xue, L.5    Yang, Y.6
  • 28
    • 84872373047 scopus 로고    scopus 로고
    • Chaotic maps-based password authenticated key agreement using smart cards
    • Guo, C., Chang, C.-C.: Chaotic maps-based password authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 18(6), 1433–1440 (2013)
    • (2013) Commun. Nonlinear Sci. Numer. Simul. , vol.18 , Issue.6 , pp. 1433-1440
    • Guo, C.1    Chang, C.-C.2
  • 29
    • 84872265840 scopus 로고    scopus 로고
    • A chaotic map based authentication scheme for telecare medicine information systems
    • Hao, X., Wang, J., Yang, Q., Yan, X., Li, P.: A chaotic map based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2), 1–7 (2013)
    • (2013) J. Med. Syst. , vol.37 , Issue.2 , pp. 1-7
    • Hao, X.1    Wang, J.2    Yang, Q.3    Yan, X.4    Li, P.5
  • 30
    • 84893187211 scopus 로고    scopus 로고
    • Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems
    • Jiang, Q., Ma, J., Lu, X., Tian, Y.: Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2), 1–8 (2014)
    • (2014) J. Med. Syst. , vol.38 , Issue.2 , pp. 1-8
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4
  • 31
    • 84886744243 scopus 로고    scopus 로고
    • Security analysis of a chaotic map based authentication scheme for telecare medicine information systems
    • Yau, W.C., Phan, R.C.W.: Security analysis of a chaotic map based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(6), 1–9 (2013)
    • (2013) J. Med. Syst. , vol.37 , Issue.6 , pp. 1-9
    • Yau, W.C.1    Phan, R.C.W.2
  • 32
    • 84925539937 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
    • Yau, W.C., Phan, R.C.W.: Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials. Nonlinear Dyn. 79(2), 809–821 (2014). doi:10.1007/s11071-014-1704-7
    • (2014) Nonlinear Dyn. , vol.79 , Issue.2 , pp. 809-821
    • Yau, W.C.1    Phan, R.C.W.2
  • 33
    • 84875673567 scopus 로고    scopus 로고
    • A chaotic maps-based authenticated key agreement protocol with strong anonymity
    • Tan, Z.: A chaotic maps-based authenticated key agreement protocol with strong anonymity. Nonlinear Dyn. 72(1–2), 311–320 (2013)
    • (2013) Nonlinear Dyn. , vol.72 , Issue.1-2 , pp. 311-320
    • Tan, Z.1
  • 34
    • 84888642495 scopus 로고    scopus 로고
    • An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
    • Li, C.T., Lee, C.C., Weng, C.Y.: An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74(4), 1133–1143 (2013)
    • (2013) Nonlinear Dyn. , vol.74 , Issue.4 , pp. 1133-1143
    • Li, C.T.1    Lee, C.C.2    Weng, C.Y.3
  • 35
    • 84899085643 scopus 로고    scopus 로고
    • An extended chaotic maps-based protocol with key agreement for multiserver environments
    • Lee, C.C., Lou, D.C., Li, C.T.: An extended chaotic maps-based protocol with key agreement for multiserver environments. Nonlinear Dyn. 76(1), 853–866 (2013). doi:10.1007/s11071-013-1174-3
    • (2013) Nonlinear Dyn. , vol.76 , Issue.1 , pp. 853-866
    • Lee, C.C.1    Lou, D.C.2    Li, C.T.3
  • 36
    • 34548620637 scopus 로고    scopus 로고
    • Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
    • Khan, M.K., Zhang, J., Wang, X.: Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos, Solitons Fract. 35(3), 519–524 (2008)
    • (2008) Chaos, Solitons Fract. , vol.35 , Issue.3 , pp. 519-524
    • Khan, M.K.1    Zhang, J.2    Wang, X.3
  • 37
    • 84861748201 scopus 로고    scopus 로고
    • An extended chaotic maps-based key agreement protocol with user anonymity
    • Lee, C.C., Chen, C.C., Wu, C.Y., Huang, S.-Y.: An extended chaotic maps-based key agreement protocol with user anonymity. Nonlinear Dyn. 69(1–2), 79–87 (2012)
    • (2012) Nonlinear Dyn. , vol.69 , Issue.1-2 , pp. 79-87
    • Lee, C.C.1    Chen, C.C.2    Wu, C.Y.3    Huang, S.-Y.4
  • 38
    • 84863989374 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
    • He, D., Chen, Y., Chen, J.: Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol. Nonlinear Dyn. 69(3), 1149–1157 (2012)
    • (2012) Nonlinear Dyn. , vol.69 , Issue.3 , pp. 1149-1157
    • He, D.1    Chen, Y.2    Chen, J.3
  • 39
    • 84871955339 scopus 로고    scopus 로고
    • A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps
    • Lee, C.C., Hsu, C.W.: A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. Nonlinear Dyn. 71(1–2), 201–211 (2013)
    • (2013) Nonlinear Dyn. , vol.71 , Issue.1-2 , pp. 201-211
    • Lee, C.C.1    Hsu, C.W.2
  • 40
    • 84910132760 scopus 로고    scopus 로고
    • Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps
    • Islam, S.K.H.: Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps. Nonlinear Dyn. 78(3), 2261–2276 (2014). doi:10.1007/s11071-014-1584-x
    • (2014) Nonlinear Dyn. , vol.78 , Issue.3 , pp. 2261-2276
    • Islam, S.K.H.1
  • 44
    • 84898048082 scopus 로고    scopus 로고
    • Enhanced three-factor security protocol for USB consumer storage devices
    • He, D., Kumar, N., Lee, J.-H.: Enhanced three-factor security protocol for USB consumer storage devices. IEEE Trans. Consum. Electr. 60(1), 30–37 (2014)
    • (2014) IEEE Trans. Consum. Electr. , vol.60 , Issue.1 , pp. 30-37
    • He, D.1    Kumar, N.2    Lee, J.-H.3
  • 45
    • 85027949488 scopus 로고    scopus 로고
    • Robust biometrics-based authentication scheme for multi-server environment
    • He, D., Wang, D.: Robust biometrics-based authentication scheme for multi-server environment. IEEE Syst. J. 9(3), 816–823 (2015). doi:10.1109/JSYST.2014.2301517
    • (2015) IEEE Syst. J. , vol.9 , Issue.3 , pp. 816-823
    • He, D.1    Wang, D.2
  • 46
    • 84901208308 scopus 로고    scopus 로고
    • Chen, Z.: iPass: privacy preserving two-factor authentication scheme against smart card loss problem
    • Wang, D., Wang, P., Ma, C., Chen, Z.: iPass: privacy preserving two-factor authentication scheme against smart card loss problem. Cryptology ePrint Archive 439, 1–35 (2012). http://eprint.iacr.org/2012/439.pdf
    • (2012) Cryptology ePrint Archive , vol.439 , pp. 1-35
    • Wang, D.1    Wang, P.2    Ma, C.3
  • 47
    • 23144460039 scopus 로고    scopus 로고
    • Security of public key cryptosystems based on Chebyshev polynomials
    • Bergamo, P., Arco, P., Santis, A., Kocarev, L.: Security of public key cryptosystems based on Chebyshev polynomials. IEEE. Trans. Circ. Syst. 52, 1382–1393 (2005)
    • (2005) IEEE. Trans. Circ. Syst. , vol.52 , pp. 1382-1393
    • Bergamo, P.1    Arco, P.2    Santis, A.3    Kocarev, L.4
  • 48
    • 40249103088 scopus 로고    scopus 로고
    • Cryptanalysis of the public key encryption based on multiple chaotic systems
    • Zhang, L.: Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos Solitons Fract. 37(3), 669–674 (2008)
    • (2008) Chaos Solitons Fract. , vol.37 , Issue.3 , pp. 669-674
    • Zhang, L.1
  • 50
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5), 541–552 (2002)
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 51
    • 84903610217 scopus 로고    scopus 로고
    • An efficient ticket based authentication protocol with unlinkability for wireless access networks
    • Jiang, Q., Ma, J., Li, G., Yang, L.: An efficient ticket based authentication protocol with unlinkability for wireless access networks. Wirel. Pers. Commun. 77(2), 1489–1506 (2014)
    • (2014) Wirel. Pers. Commun. , vol.77 , Issue.2 , pp. 1489-1506
    • Jiang, Q.1    Ma, J.2    Li, G.3    Yang, L.4
  • 52
    • 84939576175 scopus 로고    scopus 로고
    • An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
    • Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8(6), 1070–1081 (2015). doi:10.1007/s12083-014-0285-z
    • (2015) Peer-to-Peer Netw. Appl. , vol.8 , Issue.6 , pp. 1070-1081
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.