Author:
Meshram Chandrashekhar,Ibrahim Rabha W.,Deng Lunzhi,Shende Shailendra W.,Meshram Sarita Gajbhiye,Barve Sharad Kumar
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference45 articles.
1. Algehawi MB, Samsudin A (2010) A new identity based encryption (IBE) scheme using extended Chebyshev polynomial over finite fields Zp. PhysLett A 374:4670–4674
2. Bergamo P, D’Arco P, De Santis A, Kocarev L (2005) Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans Circuits Syst-I 52(7):1382–1393
3. Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8(1):18–36
4. Chang CC, Cheng TF, Hsueh WY (2016) A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards. Int J Commun Syst 29(2):290–306
5. Chen BL, Kuo WC, Wu LC (2014) Robust smartcard-based remote user password authentication scheme. Int J Commun Syst 27:377–389
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献