1 |
Yujun Niu XW, "An anonymous key agreement protocol based on chaotic maps," Communications in Nonlinear Science and Numerical Simulation, Vol. 16, Issue 4, pp. 1986-1992, April 2010.
DOI
|
2 |
Guo C, Chang CC, "Chaotic maps-based password authenticated key agreement using smart cards," Communications in Nonlinear Science and Numerical Simulation, Vol. 18, Issue 6, pp. 1433-1440, June 2013.
DOI
|
3 |
Wang XY, Zhao JF, "An improved key agreement protocol based on chaos," Communications in Nonlinear Science and Numerical Simulation, Vol. 15, Issue 12, pp. 1052-4057, December 2010.
|
4 |
Bergamo P, D'Arco P, De Santis A, Kocarev L, "Using time-stamp to improve the security of a chaotic maps based key agreement protocol," Information Sciences, Vol. 178, Issue 6, pp. 1598-1602, 2008.
DOI
|
5 |
Fateman RJ, "Lookup tables, recurrences, and complexity," in Proc. of ISSAC '89 Proceedings of the ACM-SIGSAM 1989 international symposium on Symbolic and algebraic computation, pp. 68-73, Portland, Oregon, USA, July 17-19, 1989.
|
6 |
Cheng-Chi Lee, "A simple key agreement scheme based on chaotic maps for VSAT satellite communications," International Journal of Satellite Communications and Networking, Vol. 31, Issue 4, pp. 177-186, 2013.
DOI
|
7 |
G. J Fee, M. B. Monagan, "Cryptography using Chebyshev polynomials," Citeseer, 2004.
|
8 |
D Xiao, X Liao, S Deng, "A novel key agreement protocol based on chaotic maps," Information Sciences, Vol. 177, Issue 4, pp. 1136-1142, 2007.
DOI
|
9 |
Yeh T-C, Wang Y-J, Kuo T-C, Wang S-S, "Securing RFID systems conforming to {EPC} class 1 generation 2 standard," Expert Systems with Applications, Vol. 37, Issue 12, pp 7678-7683, December 2010.
DOI
|
10 |
Di Xiao, Xiaofeng Liao, K.W. Wong, "An efficient entire chaos-based scheme for deniable authentication," Chaos, Solitons & Fractals, Vol. 23, Issue 4, pp. 1327-1331, February 2005.
DOI
|
11 |
Yoon E, "Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard," Expert Systems with Applications, Vol. 39, Issue 1, pp. 1589-1594, January 2012..
DOI
|
12 |
C.C. Chang, C.Y. Sun, "A Secure and Efficient Authentication Scheme for E-coupon Systems," Wireless Pers Coomun, Vol. 77, Issue 4, pp. 2981-2996, 2014.
DOI
|
13 |
Zi-Yao Cheng, Yun Liu, Chin-Chen Chang, Shih-Chang Chang, "Authenticated RFID security mechanism based on chaotic maps," Security and Communication Networks, Vol. 6, Issue 2, pp. 247-256, February 2013.
DOI
|
14 |
M. Akgun, M. U. Caglayan, "Weaknesses in a Recently Proposed RFID Authentication Protocol," IACR Cryptology ePrint Archive, 2013.
|
15 |
M. Akgun, M. U. Caglayan, "Vulnerabilities of RFID Security Protocol Based on Chaotic Maps," in Proc. of Network Protocols (ICNP), 2014 IEEE 22nd International Conference on, 21-24 Oct. 2014.
|
16 |
Benssalah M, Djeddou M, Drouiche K., "Security enhancement of the authenticated RFID security mechanism based on chaotic maps," Security and Communication Networks, Vol. 7, Issue 12, pp. 2356-2372, December 2014.
DOI
|
17 |
M. Akgun, A. O. Bayrak, M. U. Caglayan, "Attacks and improvements to chaotic map-based RFID authentication protocol," Security and Communication Networks, Vol. 8, Issue 18, pp. 4028-4040, December 2015.
DOI
|