Keyphrases
- authentication scheme
- authentication protocol
- mutual authentication
- security analysis
- smart card
- user authentication
- public key
- key agreement
- image encryption
- secret key
- security flaws
- lightweight
- security protocols
- image authentication
- cryptographic protocols
- rfid tags
- elliptic curve cryptography
- key distribution
- security model
- diffie hellman
- provably secure
- trusted third party
- hash functions
- cost effective
- real time