Research Article

An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity

Figure 1

Process of authentication and key establishing.