Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,General Computer Science
Reference41 articles.
1. Y.J. Choie, E. Jeong, E. Lee, Efficient identity-based authenticated key agreement protocol from pairings. Appl. Math. Comput. 162(1), 179–188 (2005)
2. X. Cao, W. Kou, X. Du, A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895–2903 (2010)
3. T.-Y. Wu, Y.-M. Tseng, An efficient user authentication and key exchange protocol for mobile client–server environment. Comput. Netw. 54(9), 1520–1530 (2010)
4. G. Chen, Y. Mao, C.K. Chui, A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)
5. X.-Y. Wang, L. Yang, R. Liu, A. Kadir, A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献