Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

Recently many authentication protocols using an extended chaotic map were suggested for a mobile user. Many researchers demonstrated that authentication protocol needs to provide key agreement, mutual authentication, and user anonymity between mobile user and server and resilience to many possible a...

Full description

Bibliographic Details
Main Authors: Jongho Moon, Youngsook Lee, Jiye Kim, Dongho Won
Format: Article
Language:English
Published: Hindawi-Wiley 2017-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2017/1378128