Login / Signup

Enhancement authentication protocol using zero-knowledge proofs and chaotic maps.

Kai ChainKuei-Hu ChangWen-Chung KuoJar-Ferr Yang
Published in: Int. J. Commun. Syst. (2017)
Keyphrases
  • authentication protocol
  • smart card
  • security analysis
  • secret key
  • security protocols
  • image encryption
  • chaotic maps