The Study of User Authentication and Key Agreement Protocols Based on Extended Chaotic Maps
碩士 === 輔仁大學 === 圖書資訊學系碩士班 === 101 === Due to the rapid development and growth of computer network, many people use email or messenger software to communicate with each other through the public network. Nevertheless, the computer network is an insecure shared platform since it may vulnerable to some...
Main Authors: | Che-Wei Hsu, 許哲維 |
---|---|
Other Authors: | Cheng-Chi Lee |
Format: | Others |
Language: | en_US |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/78982000384575196211 |
Similar Items
-
An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity.
by: Yanrong Lu, et al.
Published: (2016-01-01) -
An Extended Chaotic Map-based User Authentication and Key Agreement Scheme for HIPAA Privacy / Security Regulations
by: SUE,GUO-JUN, et al.
Published: (2016) -
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.
by: Tian-Fu Lee, et al.
Published: (2017-01-01) -
An Extended Chaotic Map-Based Authentication and Key Agreement Scheme for Multi-Server Environment
by: Yicheng Yu, et al.
Published: (2021-04-01) -
Extended chaotic map-based group authenticated key agreements for Electronic Health Record systems
by: Shan-Chun Hung, et al.
Published: (2017)