A Scheme to Passcode Generation
Abstract
Keywords
References
- J. Ding, S. Alsayigh, J. Lancrenon, S. RV, and M. Snook, "Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World," in Topics in Cryptology – CT-RSA 2017: The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings, H. Handschuh, Ed., ed Cham: Springer International Publishing, 2017, pp. 183-204.
- C.-M. Chen, W. Fang, K.-H. Wang, and T.-Y. Wu, "Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol”," Nonlinear Dynamics, vol. 87, pp. 2073-2075, February 01 2017.
- M. S. Farash and M. A. Attari, "An efficient and provably authenticated key exchange protocol based on Chebyshev chaotic maps," Nonlinear Dynamics, vol. 77, pp. 399-411, July 01 2014. password-based
- X. Guo and J. Zhang, "Secure group key agreement protocol based on chaotic Hash," Information Sciences, vol. 180, pp. 4069-4074, 2010/10/15/ 2010.
- T.-F. Lee, "Enhancing the security of password authenticated key agreement protocols based on chaotic maps," Information Sciences, vol. 290, pp. 63-71, 2015/01/01/ 2015.
- J. W. Kalat, Introduction to psychology: Nelson Education, 2016.
- A. Y. Bani Hashim, "Development of Artificial Intelligent Control," Universiti Putra Malaysia, 2002. for Manipulator Position
- H. Ismail and K. Hon, "The nesting of two-dimensional shapes using genetic algorithms," Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture, vol. 209, pp. 115-124, 1995.
Details
Primary Language
English
Subjects
-
Journal Section
-
Authors
Ahmad Yusairi Bani Hashim
This is me
Publication Date
March 1, 2018
Submission Date
-
Acceptance Date
-
Published in Issue
Year 2018 Volume: 7 Number: 1