Login / Signup
A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications.
Chun-Ta Li
Published in:
Inf. Technol. Control. (2012)
Keyphrases
</>
authentication scheme
user authentication
mobile communications
secret key
security analysis
smart card
end users
key management
authentication protocol
wireless networks
public key
trusted third party
low cost
distributed computing
information security
database systems
provably secure
web services