Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices

Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA) protocols based on public-key techniques have attracted much attention, providing secure access and communication mechanism for various application environments. Among these public-key techniques used for AKA...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on dependable and secure computing Vol. 19; no. 2; pp. 1338 - 1351
Main Authors Qiu, Shuming, Wang, Ding, Xu, Guoai, Kumari, Saru
Format Journal Article
LanguageEnglish
Published Washington IEEE 01.03.2022
IEEE Computer Society
Subjects
Online AccessGet full text

Cover

Loading…