Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
With the wide deployment of new computing paradigms, such as cloud computing and edge computing, the people can access services provided by remote servers more conveniently via the Internet. To preserve the security of those messages transmitted over the public channel, remote user authentication pr...
Saved in:
Main Authors: | Yan Zhao, Shiming Li, Liehui Jiang, Tieming Liu |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2019-04-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147719842152 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
by: Yousheng Zhou, et al.
Published: (2016-01-01) -
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
by: Jun-Sub Kim, et al.
Published: (2014-04-01) -
A Performance and Usability Aware Secure Two-Factor User Authentication Scheme for Wireless Sensor Networks
by: Sang Guun Yoo, et al.
Published: (2013-05-01) -
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
by: Keiichi Iwamura, et al.
Published: (2025-01-01) -
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
by: Jun-Sub Kim, et al.
Published: (2013-01-01)