User authentication scheme preserving anonymity for ubiquitous devices.

Benchaa DjellaliKheira BelarbiAbdallah ChouarfiaPascal Lorenz
Published in: Secur. Commun. Networks (2015)
Keyphrases
  • authentication scheme
  • user authentication
  • secret key
  • mobile devices
  • smart card
  • ubiquitous computing environments
  • similarity measure