Login / Signup
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation.
Inam ul Haq
Jian Wang
Youwen Zhu
Saad Maqbool
Published in:
Digit. Commun. Networks (2021)
Keyphrases
</>
authentication protocol
security analysis
key agreement protocol
hash functions
key technologies
data distribution
smart card
secure communication
image compression
data access
public key
private key