Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices

S Qiu, D Wang, G Xu, S Kumari - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Due to the limitations of symmetric-key techniques, authentication and key agreement (AKA)
protocols based on public-key techniques have attracted much attention, providing secure …

A chaos-based symmetric image encryption scheme using a bit-level permutation

Z Zhu, W Zhang, K Wong, H Yu - Information Sciences, 2011 - Elsevier
In recent years, a variety of chaos-based digital image encryption algorithms have been
suggested. Most of these algorithms implement permutations and diffusions at the pixel level …

A secure three factor based authentication scheme for health care systems using IoT enabled devices

SS Sahoo, S Mohanty, B Majhi - Journal of Ambient Intelligence and …, 2021 - Springer
In recent years, the Internet of Things (IoT) has gained increasing popularity due to the
usage of Internet-enabled devices. However, Internet-enabled devices, also known as smart …

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps

S Kumari, X Li, F Wu, AK Das, H Arshad… - Future Generation …, 2016 - Elsevier
Spread of wireless network technology has opened new doors to utilize sensor technology
in various areas via Wireless Sensor Networks (WSNs). Many authentication protocols for …

An image encryption scheme based on rotation matrix bit-level permutation and block diffusion

Y Zhang, D Xiao - Communications in Nonlinear Science and Numerical …, 2014 - Elsevier
This paper proposes a novel image encryption scheme based on rotation matrix bit-level
permutation and block diffusion. Firstly, divide plain image into non-overlapping 8× 8 pixels …

A novel method to design S-box based on chaotic map and genetic algorithm

Y Wang, KW Wong, C Li, Y Li - Physics Letters A, 2012 - Elsevier
The substitution box (S-box) is an important component in block encryption algorithms. In
this Letter, the problem of constructing S-box is transformed to a Traveling Salesman …

Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform

Y Zhang, D Xiao - Optics and Lasers in Engineering, 2013 - Elsevier
In this paper, we design a novel discrete fractional random transform based on 2D chaotic
logistic maps and two chaotic random masks resulting from Chirikov standard map. Then, a …

A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems

D Mishra, J Srinivas, S Mukhopadhyay - Journal of medical systems, 2014 - Springer
Advancement in network technology provides new ways to utilize telecare medicine
information systems (TMIS) for patient care. Although TMIS usually faces various attacks as …

Efficient anonymous password-authenticated key exchange protocol to read isolated smart meters by utilization of extended Chebyshev chaotic maps

D Abbasinezhad-Mood… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In smart grid, key exchange protocols play a vital role in providing secure channels to read
consumption reports from the smart meters. Thus far, several key exchange schemes have …

[Retracted] A Robust and Privacy‐Preserving Anonymous User Authentication Scheme for Public Cloud Server

N Khan, J Zhang, SU Jan - Security and Communication …, 2022 - Wiley Online Library
Everyone desires to avail online services provided by different service providers securely,
efficiently, and effectively. In this regard, security is still a significant concern for them …