An Improved Approach to Secure Authentication and Signing.
David ArglesAlex PeaseRobert John WaltersPublished in: AINA Workshops (1) (2007)
Keyphrases
- authentication mechanism
- user authentication
- authentication scheme
- data encryption
- authentication protocol
- security mechanisms
- factor authentication
- identity management
- security analysis
- password authentication
- key distribution
- security requirements
- integrity verification
- signature verification
- signature scheme
- secure manner
- private key
- smart card
- security services
- public key cryptography
- electronic payment
- rights management
- identity authentication
- public key
- key exchange
- encryption decryption
- key agreement protocol
- sign language
- secure communication
- security protocols
- information security
- trusted third party
- image authentication
- key agreement
- group communication
- key management
- security issues
- access control
- authentication systems
- resource constrained
- mutual authentication
- data confidentiality
- biometric authentication
- key exchange protocol
- elliptic curve cryptography
- public key infrastructure
- diffie hellman
- security model
- trusted platform module
- lightweight