English  |  正體中文  |  简体中文  |  Items with full text/Total items : 90453/105671 (86%)
Visitors : 15667814      Online Users : 118
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    ASIA unversity > 資訊學院 > 資訊工程學系 > 期刊論文 >  Item 310904400/25349

    Please use this identifier to cite or link to this item: http://asiair.asia.edu.tw/ir/handle/310904400/25349

    Title: Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications
    Authors: Guo, Cheng;Guo, Cheng;張真誠;Chang, Chin-Chen;Sun, Chin-Yu;Sun, Chin-Yu
    Contributors: 資訊工程學系
    Date: 2013-04
    Issue Date: 2013-07-11 14:18:32 (UTC+8)
    Abstract: Mobile users can roam into foreign networks and transmit messages to foreign agents, and they can access the services provided by a foreign agent by using their
    mobile devices. Thus, mobile user authentication and key agreement for wireless communications are becoming more and more important. In recent years, most of the existing
    user authentication and key-agreement protocols with smart cards for wireless communications utilized modular exponential computing and scalar multiplication on elliptic
    curves to ensure their security. Inspired by the key-agreement protocols based on chaotic
    maps, we proposed a novel, chaotic maps-based authentication and key-agreement protocol using smart cards for wireless communications. In our protocol, mobile users and
    foreign agents can authenticate each other and establish a common session key for further
    communications. Analysis of the security and functionality of our protocol showed that
    it can satisfy essential security and functionality requirements. In addition, performance
    analysis showed that our protocol can refrain from consuming modular exponential operation and scalar multiplication on elliptic curves. The computational cost of the proposed
    protocol compares favorably with the cost of related protocols.
    Relation: Journal of Information Hiding and Multimedia Signal Processing, V.4 N.2 : 99-109.
    Appears in Collections:[資訊工程學系] 期刊論文

    Files in This Item:

    File SizeFormat

    All items in ASIAIR are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback