A novel anonymous authentication scheme without cryptography.
Runhua ShiHong ZhongLiusheng HuangPublished in: Trans. Emerg. Telecommun. Technol. (2014)
Keyphrases
- authentication scheme
- elliptic curve cryptography
- public key
- smart card
- image encryption
- secret key
- user authentication
- public key cryptography
- information security
- security flaws
- image authentication
- authentication protocol
- security analysis
- peer to peer
- key management
- security issues
- cryptographic protocols
- network security
- lightweight