Login / Signup
Chaotic Map based Privacy Preservation User Authentication Scheme for WBANs.
Shreeya Swagatika Sahoo
Sujata Mohanty
Published in:
TENCON (2019)
Keyphrases
</>
authentication scheme
image encryption
chaotic map
privacy preservation
user authentication
privacy preserving
resource constrained
data privacy
security analysis
smart card
public key
secret key
data mining
piecewise linear
authentication protocol
hash functions
similarity measure
information systems