Search Results

There are 69268 results for: content related to: Chaotic map-based three-party authenticated key agreement

  1. An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards

    Security and Communication Networks

    Volume 8, Issue 18, December 2015, Pages: 4136–4156, Vanga Odelu, Ashok Kumar Das and Adrijit Goswami

    Version of Record online : 27 AUG 2015, DOI: 10.1002/sec.1330

  2. GBAAM: group-based access authentication for MTC in LTE networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3282–3299, Jin Cao, Maode Ma and Hui Li

    Version of Record online : 22 APR 2015, DOI: 10.1002/sec.1252

  3. User authentication scheme preserving anonymity for ubiquitous devices

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3131–3141, Benchaa Djellali, Kheira Belarbi, Abdallah Chouarfia and Pascal Lorenz

    Version of Record online : 26 MAR 2015, DOI: 10.1002/sec.1238

  4. Analyses of several recently proposed group key management schemes

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 136–148, Niu Liu, Shaohua Tang, Lingling Xu and Daojing He

    Version of Record online : 5 MAR 2014, DOI: 10.1002/sec.966

  5. An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 245–260, Lili Xu and Fan Wu

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.977

  6. Provably secure three-factor authentication and key agreement scheme for session initiation protocol

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 5412–5431, Sravani Challa, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Fan Wu and Xiong Li

    Version of Record online : 28 NOV 2016, DOI: 10.1002/sec.1707

  7. An efficient multi-gateway-based three-factor user authentication and key agreement scheme in hierarchical wireless sensor networks

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 2070–2092, Ashok Kumar Das, Anil Kumar Sutrala, Saru Kumari, Vanga Odelu, Mohammad Wazid and Xiong Li

    Version of Record online : 23 FEB 2016, DOI: 10.1002/sec.1464

  8. A survey of cyber crimes

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 422–437, Yanping Zhang, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang and Hongmei Deng

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.331

  9. A collusion attack on asymmetric group key exchange

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2189–2193, Jikai Teng and Chuankun Wu

    Version of Record online : 14 NOV 2014, DOI: 10.1002/sec.1163

  10. On robust key agreement based on public key authentication

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 77–87, Feng Hao

    Version of Record online : 18 APR 2012, DOI: 10.1002/sec.550

  11. Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS

    Security and Communication Networks

    Volume 9, Issue 13, 10 September 2016, Pages: 1983–2001, Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li and Fan Wu

    Version of Record online : 11 FEB 2016, DOI: 10.1002/sec.1452

  12. Authentication process enhancements in WiMAX networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4703–4725, Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful Jahari Hashim, Borhanuddin M. Ali and Abbas Jamalipour

    Version of Record online : 16 AUG 2016, DOI: 10.1002/sec.1577

  13. Privacy preserving smartcard-based authentication system with provable security

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3028–3044, Jin Wook Byun

    Version of Record online : 17 FEB 2015, DOI: 10.1002/sec.1229

  14. A practical strongly secure one-round authenticated key exchange protocol without random oracles

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1118–1131, Zheng Yang and Wu Yang

    Version of Record online : 9 SEP 2014, DOI: 10.1002/sec.1067

  15. Enhancement on strongly secure group key agreement

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 126–135, Yuh-Min Tseng, Tung-Tso Tsai and Sen-Shan Huang

    Version of Record online : 19 FEB 2014, DOI: 10.1002/sec.964

  16. Comprehensive analysis of the authentication methods in wireless body area networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4777–4803, Mohammad Masdari and Safiyeh Ahmadzadeh

    Version of Record online : 17 OCT 2016, DOI: 10.1002/sec.1642

  17. Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1331–1339, Yanrong Lu, Lixiang Li, Haipeng Peng and Yixian Yang

    Version of Record online : 11 JAN 2016, DOI: 10.1002/sec.1419

  18. A resilient identity-based authenticated key exchange protocol

    Security and Communication Networks

    Volume 8, Issue 13, 10 September 2015, Pages: 2279–2290, Ibrahim Elashry, Yi Mu and Willy Susilo

    Version of Record online : 23 JAN 2015, DOI: 10.1002/sec.1172

  19. Group authenticated key exchange schemes via learning with errors

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3142–3156, Xiaopeng Yang, Wenping Ma and Chengli Zhang

    Version of Record online : 5 MAR 2015, DOI: 10.1002/sec.1239

  20. SAKE: scalable authenticated key exchange for mobile e-health networks

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2754–2765, Weiran Liu, Jianwei Liu, Qianhong Wu, Willy Susilo, Hua Deng and Bo Qin

    Version of Record online : 28 JAN 2015, DOI: 10.1002/sec.1198