ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
5
views
0
references
Top references
cited by
5
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,838
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
Author(s):
Chun-Ta Li
,
Chin-Ling Chen
,
Cheng-Chi Lee
,
Chi-Yao Weng
,
Chien-Ming Chen
,
CT LI
,
CL Chen
,
CC Lee
,
CY Weng
,
CM Chen
Publication date:
2018
Journal:
Soft Comput
Read this article at
ScienceOpen
Publisher
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Recursive Rule based Visual Categorization
Author and article information
Journal
DOI::
10.1007/s00500-017-2504-z
ScienceOpen disciplines:
Uncategorized
Data availability:
ScienceOpen disciplines:
Uncategorized
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,838
A neural basis for password-based species recognition in an avian brood parasite
Authors:
Kathleen S. Lynch
,
Annmarie Gaglio
,
Elizabeth Tyler
…
Using propensity scores to adjust for selection bias when assessing the effectiveness of Alcoholics Anonymous in observational studies.
Authors:
Yu Ye
,
Lee Ann Kaskutas
P2A: Privacy Preserving Anonymous Authentication Based on Blockchain and SGX
Authors:
See all similar
Cited by
5
A secure authenticated and key exchange scheme for fog computing
Authors:
Chien-Ming Chen
,
Yanyu Huang
,
King-Hang Wang
…
Security in IoT-enabled smart agriculture: architecture, security solutions and challenges
Authors:
Anusha Vangala
,
Ashok Kumar Das
,
Vinay Chamola
…
Improved Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices
Authors:
Yongli Tang
,
Ying Li
,
Zongqu Zhao
…
See all cited by