Login / Signup
Enhancement authentication protocol using zero-knowledge proofs and chaotic maps.
Kai Chain
Kuei-Hu Chang
Wen-Chung Kuo
Jar-Ferr Yang
Published in:
Int. J. Commun. Syst. (2017)
Keyphrases
</>
authentication protocol
smart card
security analysis
secret key
security protocols
image encryption
chaotic maps