2013
DOI: 10.1007/s11071-013-1174-3
|View full text |Cite
|
Sign up to set email alerts
|

An extended chaotic-maps-based protocol with key agreement for multiserver environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 52 publications
(37 citation statements)
references
References 32 publications
0
37
0
Order By: Relevance
“…In MSA architecture, [27][28][29][30][31][32] the users get registered through a centralized control center. Thereafter, the users may get services of authorized service providers without reregistration.…”
Section: Multiserver Authentication Architecturementioning
confidence: 99%
“…In MSA architecture, [27][28][29][30][31][32] the users get registered through a centralized control center. Thereafter, the users may get services of authorized service providers without reregistration.…”
Section: Multiserver Authentication Architecturementioning
confidence: 99%
“…In addition, Wei et al's scheme does not provide the formal security verification using AVISPA tool as well as formal verification using BAN logic. Lee et al's scheme (Lee et al, 2014) is inefficient login and authentication phase and it does not provide formal security verification using AVISPA tool. Li et al's scheme (Li et al, 2015) is vulnerable to privileged-insider attack, stolen smart card attack and user impersonation attack, and it does not support formal security verification using AVISPA tool.…”
Section: Functionality Comparisonmentioning
confidence: 99%
“…Communication overhead Lee et al (2014) 3 messages (2880 bits) Li et al (2015) 4 messages (2240 bits) Chen et al (2015) 3 messages (1280 bits) Pippal et al (2013) 3 messages (5056 bits) Wei et al (2014) 3 messages (2994 bits) Ours 2 messages (2592 bits)…”
Section: Fig 4 -Role Specification In Hlpsl For the Servermentioning
confidence: 99%
See 1 more Smart Citation
“…Focusing on the multi-server environment, in the last decade, some authors have introduced smart card based authentication schemes which migrate verification parameters to a personal device [2][3][4][5][6][7][8][9][10][11]. Lin et al [2] proposed an offline password changing scheme utilizing time stamps and the discrete logarithm problem.…”
Section: Introductionmentioning
confidence: 99%