Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA) protocols based on public-key techniques have attracted much attention, providing secure access and communication mechanism for various application environments. Among these public-key techniques used for AKA...
Saved in:
Published in | IEEE transactions on dependable and secure computing Vol. 19; no. 2; pp. 1338 - 1351 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Washington
IEEE
01.03.2022
IEEE Computer Society |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!