Security analysis on "Three-factor authentication protocol using physical unclonable function for IoV".
Ilyes AhmimNacira Ghoualmi-ZineAhmed AhmimMarwa AhmimPublished in: Int. J. Inf. Sec. (2022)
Keyphrases
- security analysis
- authentication protocol
- public key
- smart card
- security requirements
- mutual authentication
- authentication scheme
- security properties
- key exchange
- user authentication
- encryption scheme
- key distribution
- cryptographic protocols
- security protocols
- real time
- encryption algorithm
- sensitive data
- signature scheme
- lightweight