Sign in

An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map.

Venkatasamy SureshkumarRuhul AminMohammad S. ObaidatIsswarya Karthikeyan
Published in: J. Inf. Secur. Appl. (2020)
Keyphrases
  • security analysis
  • database systems
  • smart card
  • secret key
  • authentication protocol
  • private key
  • authentication scheme