ECC Based Secure Authentication Solutions.
Ievgen KabinZoya DykaDan KlannPeter LangendörferPublished in: Krypto-Tag (2019)
Keyphrases
- security analysis
- elliptic curve cryptography
- authentication scheme
- user authentication
- data encryption
- identity management
- public key cryptography
- authentication protocol
- authentication mechanism
- security requirements
- security mechanisms
- elliptic curve
- public key
- integrity verification
- digital signature
- key distribution
- smart card
- high security
- factor authentication
- optimal solution
- secure manner
- private key
- trusted third party
- identity authentication
- security services
- biometric authentication
- signature scheme
- security issues
- personal information
- access control