2019
DOI: 10.1109/access.2019.2930542
|View full text |Cite
|
Sign up to set email alerts
|

A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(21 citation statements)
references
References 34 publications
0
21
0
Order By: Relevance
“…This improved Chebyshev chaotic-map shows the assumptions of discrete logarithm and Diffie Hellman [22,40]. The assumption problems are:…”
Section: Mathematical Assumption Of Chebyshev Chaotic-mapmentioning
confidence: 97%
See 3 more Smart Citations
“…This improved Chebyshev chaotic-map shows the assumptions of discrete logarithm and Diffie Hellman [22,40]. The assumption problems are:…”
Section: Mathematical Assumption Of Chebyshev Chaotic-mapmentioning
confidence: 97%
“…Yang et al constructed a competent user authentication, which resolves the key issues of Frank et al Of late, several authentication mechanisms, namely two-factor [41], three-factor [11], identity-based [8], etc. have been constructed using pairing-based, factoring and discrete logarithm, elliptic-curve (EC) cryptography [22], and chaotic-map [40].…”
Section: Research Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…(7) Three-factor secrecy: To ensure the security of the user's secret keys, schemes should adopt three factors (i.e., password, smartcard, and biometrics). Even if any two authentication factors are compromised, the adversary cannot break the other one or impersonate the user successfully [28].…”
Section: B Security and Functionality Requirementmentioning
confidence: 99%