Common Contracts

2 similar null contracts

Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless
April 8th, 2013
  • Filed
    April 8th, 2013

Abstract. Mobile users can roam into foreign networks and transmit messages to for- eign agents, and they can access the services provided by a foreign agent by using their mobile devices. Thus, mobile user authentication and key agreement for wireless commu- nications are becoming more and more important. In recent years, most of the existing user authentication and key-agreement protocols with smart cards for wireless commu- nications utilized modular exponential computing and scalar multiplication on elliptic curves to ensure their security. Inspired by the key-agreement protocols based on chaotic maps, we proposed a novel, chaotic maps-based authentication and key-agreement pro- tocol using smart cards for wireless communications. In our protocol, mobile users and foreign agents can authenticate each other and establish a common session key for further communications. Analysis of the security and functionality of our protocol showed that it can satisfy essential security and functi

AutoNDA by SimpleDocs
Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless
February 24th, 2013
  • Filed
    February 24th, 2013

Abstract. Mobile users can roam into foreign networks and transmit messages to for- eign agents, and they can access the services provided by a foreign agent by using their mobile devices. Thus, mobile user authentication and key agreement for wireless commu- nications are becoming more and more important. In recent years, most of the existing user authentication and key-agreement protocols with smart cards for wireless commu- nications utilized modular exponential computing and scalar multiplication on elliptic curves to ensure their security. Inspired by the key-agreement protocols based on chaotic maps, we proposed a novel, chaotic maps-based authentication and key-agreement pro- tocol using smart cards for wireless communications. In our protocol, mobile users and foreign agents can authenticate each other and establish a common session key for further communications. Analysis of the security and functionality of our protocol showed that it can satisfy essential security and functi

Time is Money Join Law Insider Premium to draft better contracts faster.