Login / Signup

An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation.

Inam ul HaqJian WangYouwen ZhuSaad Maqbool
Published in: Digit. Commun. Networks (2021)
Keyphrases
  • authentication protocol
  • security analysis
  • key agreement protocol
  • hash functions
  • key technologies
  • data distribution
  • smart card
  • secure communication
  • image compression
  • data access
  • public key
  • private key