Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Robust Biometric-Based Three-factor Remote User Authentication Scheme

The rapid development of Internet of Things (IoT) technology, which is an inter connection of networks through an insecure public channel i.e. Internet demands for authenticating the remote user trying to access the secure network resources. In 2013, Ankita et al. proposed an improved three factor remote user authentication scheme. In this poster we will show that Ankita et al scheme is vulnera...

متن کامل

A Security Enhanced Remote User Authentication Scheme Using Smart Cards

A remote user authentication system has become an important part of security, along with confidentiality and integrity, for systems such as the Internet that offer remote access over untrustworthy networks. In 2006, Liaw et al. proposed an efficient and complete remote user authentication scheme using smart cards that includes a session key being agreed and an updated password phase. However, t...

متن کامل

Watermarking Scheme Based on Multiple Chaotic Maps

a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear chaotic map is also usedto determine the location of DCT coefficients for the watermarkembedding. The purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

متن کامل

Security Analysis on a Timestamp-based Remote User Authentication Scheme

In recent years, many password-based remote user authentication schemes have been presented. In 2003, Shen et al. proposed a timestamp-based password authentication scheme using smart cards. In their scheme, the server does not need to maintain any verification table and only stores a secret key. However, Awasthi et al. found that Shen et al.’s scheme is vulnerable to impersonation attacks with...

متن کامل

An Enhanced Remote User Authentication Scheme

Remote user authentication schemes are used to verify the legitimacy of remote users’ login request. Recently, several dynamic user authentication schemes have been proposed. It can be seen that, these schemes have weaknesses because of using timestamps. The implement of strict and safe time synchronization is very difficult and increases network overhead. In this paper, we propose a new dynami...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Distributed Sensor Networks

سال: 2019

ISSN: 1550-1477,1550-1477

DOI: 10.1177/1550147719842152