Login / Signup

Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing.

Wenting LiPing Wang
Published in: CSCloud/EdgeCom (2019)
Keyphrases
  • chaotic maps
  • image encryption
  • secret key
  • authentication scheme
  • security mechanisms
  • image encryption algorithm
  • image encryption scheme
  • user authentication