Articles with "chebyshev chaotic" as a keyword



Photo by fourcolourblack from unsplash

Secure VANET Authentication Protocol (SVAP) Using Chebyshev Chaotic Maps for Emergency Conditions

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2021.3137877

Abstract: It is crucial to support emergency applications provided by vehicular adhoc network (VANET) through enabling vehicles to quickly access to the infrastructure and consequently request rescue services. Additionally, the communication channels between vehicles and the… read more here.

Keywords: chaotic maps; chebyshev chaotic; authentication protocol; security ... See more keywords
Photo by lensingmyworld from unsplash

Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2016.2616876

Abstract: Multi-server environment is the most common scenario for a large number of enterprise class applications. In this environment, user registration at each server is not recommended. Using multi-server authentication architecture, user can manage authentication to… read more here.

Keywords: chebyshev chaotic; authentication; scheme; multi server ... See more keywords

Provably Secure Escrow-Less Chebyshev Chaotic Map-Based Key Agreement Protocol for Vehicle to Grid Connections With Privacy Protection

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2020.2974258

Abstract: Security and privacy concerns necessitate the careful management of shared keys in the vehicle to grid (V2G) networks. To do so, in recent years, several interesting key agreement protocols have been proposed to be employed… read more here.

Keywords: vehicle grid; chebyshev chaotic; key agreement; security ... See more keywords