Designing an Authentication Protocol via Authentication Test.
Jiafen LiuMingtian ZhouPublished in: ISCC (2007)
Keyphrases
- authentication protocol
- smart card
- security analysis
- user authentication
- lightweight
- key distribution
- authentication scheme
- password authentication
- public key
- secret key
- security protocols
- authentication mechanism
- rfid tags
- mutual authentication
- ban logic
- rfid systems
- hash functions
- digital signature
- security requirements
- information security