Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User
Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible a...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2017-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2017/1378128 |