2015
DOI: 10.1016/j.cnsns.2014.05.027
|View full text |Cite
|
Sign up to set email alerts
|

Improved chaotic maps-based password-authenticated key agreement using smart cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
62
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 47 publications
(62 citation statements)
references
References 23 publications
0
62
0
Order By: Relevance
“…Regarding the protocols in the works of Gue and Chang and Xiao et al, both of them also apply the timestamp to measure the freshness of received messages, meaning they have potential synchronization problems. Similar to the work of Lin, because the protocols of Gue and Chang and Xiao et al use additionally symmetric encryption/decryption operations, their computation cost is higher than ours. In the same study, Lin pointed out that the session key in 1 study can be derived using the method in another study once the messages transmitted in the authenticated key exchange procedure are intercepted.…”
Section: Performance Evaluationmentioning
confidence: 65%
See 3 more Smart Citations
“…Regarding the protocols in the works of Gue and Chang and Xiao et al, both of them also apply the timestamp to measure the freshness of received messages, meaning they have potential synchronization problems. Similar to the work of Lin, because the protocols of Gue and Chang and Xiao et al use additionally symmetric encryption/decryption operations, their computation cost is higher than ours. In the same study, Lin pointed out that the session key in 1 study can be derived using the method in another study once the messages transmitted in the authenticated key exchange procedure are intercepted.…”
Section: Performance Evaluationmentioning
confidence: 65%
“…Similar to the work of Lin, because the protocols of Gue and Chang and Xiao et al use additionally symmetric encryption/decryption operations, their computation cost is higher than ours. In the same study, Lin pointed out that the session key in 1 study can be derived using the method in another study once the messages transmitted in the authenticated key exchange procedure are intercepted. Additionally, Guo and Chang's protocol does not preserve privacy.…”
Section: Performance Evaluationmentioning
confidence: 65%
See 2 more Smart Citations
“…In 2013, Guo et al [21] proposed a password-authenticated using smart card. In 2015, Lin et al [24] proposed an improved chaotic maps based authentication protocol using smart card.…”
Section: Introductionmentioning
confidence: 99%