2021
DOI: 10.1007/s10916-021-01750-7
|View full text |Cite
|
Sign up to set email alerts
|

Construction of a Chaotic Map-Based Authentication Protocol for TMIS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 33 publications
0
1
0
Order By: Relevance
“…In recent years, the requirement for new chaotic maps and systems is significantly increasing mostly for image encryption (Ye and Wong 2012, Li et al 2017, Wang et al 2020, Hu and Li 2021, Patro and Acharya 2021, Toktas et al 2021, Liu et al 2022, digital audio encryption (Shah et al 2021), pseudo random number generation (Krishnamoorthi et al 2021, Tutueva et al 2021, cryptography (Zheng and Hu 2022) secure communication (Bouteghrine et al 2021) even for secure authentication (Dharminder et al 2021). Nearly all of the kernels of these research papers are powered by existing chaotic maps discovered by the researchers.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, the requirement for new chaotic maps and systems is significantly increasing mostly for image encryption (Ye and Wong 2012, Li et al 2017, Wang et al 2020, Hu and Li 2021, Patro and Acharya 2021, Toktas et al 2021, Liu et al 2022, digital audio encryption (Shah et al 2021), pseudo random number generation (Krishnamoorthi et al 2021, Tutueva et al 2021, cryptography (Zheng and Hu 2022) secure communication (Bouteghrine et al 2021) even for secure authentication (Dharminder et al 2021). Nearly all of the kernels of these research papers are powered by existing chaotic maps discovered by the researchers.…”
Section: Introductionmentioning
confidence: 99%