2014
DOI: 10.1007/s11277-014-1829-5
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
43
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(44 citation statements)
references
References 27 publications
1
43
0
Order By: Relevance
“…Lee et al [25] presented an improved chaotic map-based authentication protocol, and He et al [29] proved that Lee et al 's protocol does not resist DoS and insider attacks. To enhance the functionality and security, Lin [26] proposed a new authentication and key agreement protocol using a chaotic map and dynamic identity. Unfortunately, Islam et al [27] found that Lin's protocol cannot resist wellknown attacks, and proposed an enhanced authentication protocol.…”
Section: Security and Communication Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Lee et al [25] presented an improved chaotic map-based authentication protocol, and He et al [29] proved that Lee et al 's protocol does not resist DoS and insider attacks. To enhance the functionality and security, Lin [26] proposed a new authentication and key agreement protocol using a chaotic map and dynamic identity. Unfortunately, Islam et al [27] found that Lin's protocol cannot resist wellknown attacks, and proposed an enhanced authentication protocol.…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…This section presents comparisons of the functionality between the improved protocol and related protocols [23][24][25][26][27][28], and the computational spending between the improved protocol and the other protocols [25][26][27][28][29][30] is also compared here. …”
Section: Comparison Of Functionality and Performancementioning
confidence: 99%
“…In this section, we concretely compare some properties which includes resistance, functionality and performance between our proposal and other related identity-based authentication schemes, including Lin's scheme [32] [27]. Table 2 shows the result of resistance comparison among these authenticated key agreement schemes.…”
Section: Comparisons With Related Schemesmentioning
confidence: 99%
“…We show the proposed scheme is able to overcome weaknesses in Lin's scheme and withstand various attacks [18][19][20][21][22][23][24][25][26].…”
Section: Security Analysismentioning
confidence: 99%
“…However, He et al [17] pointed out that Lee et al's scheme was vulnerable to the insider attack and the DoS attack. Recently, Lin [18] designed a dynamic identity based authentication scheme using chaotic maps to overcome weaknesses in previous schemes. He also demonstrated that his scheme could resist all existential attacks.…”
Section: Introductionmentioning
confidence: 99%