Security Analysis of Authentication Schemes in m-Commerce based on Fuzzy Comprehensive Evaluation.
Rui HuaRuntong ZhangDandan LiPublished in: ICISO (2010)
Keyphrases
- security analysis
- fuzzy comprehensive evaluation
- evaluation model
- evaluation method
- security requirements
- user authentication
- smart card
- authentication protocol
- quality evaluation
- public key
- security model
- mobile commerce
- high security
- mutual authentication
- authentication scheme
- security properties
- elliptic curve cryptography
- fuzzy clustering
- encryption scheme
- analytic hierarchy process
- private key
- provably secure
- case study
- low cost
- artificial intelligence
- security mechanisms
- data quality
- lightweight