Login / Signup
An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity.
You-sheng Zhou
Junfeng Zhou
Feng Wang
Feng Guo
Published in:
Appl. Comput. Intell. Soft Comput. (2016)
Keyphrases
</>
image encryption
authentication scheme
chaotic map
smart card
user authentication
secret key
security analysis
public key
piecewise linear
authentication protocol
ad hoc networks