A security enhanced user authentication scheme for multi-server environment without using smart cards.
Pengshuai QiaoPublished in: Int. J. Electron. Secur. Digit. Forensics (2015)
Keyphrases
- authentication scheme
- smart card
- user authentication
- information security
- authentication protocol
- security requirements
- security analysis
- java card
- security flaws
- elliptic curve cryptography
- secret key
- security mechanisms
- digital signature
- sensitive data
- password guessing
- public key
- power analysis
- low cost
- intrusion detection
- access requests
- security properties
- countermeasures
- end to end
- sys tems