Login / Signup
An authentication scheme for multi-server environments based on chaotic maps.
Yun Tao
Published in:
Int. J. Electron. Secur. Digit. Forensics (2016)
Keyphrases
</>
authentication scheme
image encryption
chaotic maps
image encryption scheme
smart card
image encryption algorithm
secret key
public key
user authentication
security analysis
authentication protocol
high dimensional
end to end
resource constraints
key management