Author of the publication

A Novel and Concise Multi-receiver Protocol Based on Chaotic Maps with Privacy Protection.

, , and . Int. J. Netw. Secur., 19 (3): 371-382 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient quantum identity authentication key agreement protocol without entanglement., , and . Quantum Inf. Process., 19 (10): 381 (2020)Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme., , , and . J. Inf. Hiding Multim. Signal Process., 4 (2): 110-118 (2013)A biometrics-based multi-server key agreement scheme on chaotic maps cryptosystem., , , and . J. Inf. Hiding Multim. Signal Process., 6 (2): 211-224 (2015)A Novel Client-to-Client Password-Authenticated Key Exchange Protocol using Chaotic Maps in the Standard Model., , and . J. Inf. Hiding Multim. Signal Process., 6 (5): 997-1008 (2015)A Lightweight RFID Authentication Protocol using Qubits against Relay Attack., , and . J. Inf. Hiding Multim. Signal Process., 9 (4): 874-883 (2018)An Enhanced Dragonfly Key Exchange Protocol Using Chaotic Maps., , and . J. Inf. Hiding Multim. Signal Process., 7 (2): 376-385 (2016)A Password-Authenticated Key Exchange Scheme Using Chaotic Maps towards Multiple Servers to Server., , and . J. Inf. Hiding Multim. Signal Process., 7 (2): 222-232 (2016)Provably Secure and Repeatable Authenticated Privacy-Protection Scheme Using Chaotic Maps with Distributed Architecture., and . Int. J. Netw. Secur., 20 (3): 463-471 (2018)A Novel and Provable Authenticated Key Agreement Protocol with Privacy Protection Based on Chaotic Maps towards Mobile Network., , , and . Int. J. Netw. Secur., 18 (1): 116-123 (2016)A Provably Password Authenticated Key Exchange Scheme Based on Chaotic Maps in Different Realm., , and . Int. J. Netw. Secur., 18 (4): 688-698 (2016)