Vulnerabilities in a Two-Factor User Authentication in Multi-server Networks Protocol.
Adela GeorgescuPublished in: SOCO-CISIS-ICEUTE (2014)
Keyphrases
- user authentication
- authentication protocol
- information security
- security analysis
- authentication scheme
- keystroke dynamics
- smart card
- lightweight
- biometric authentication
- security protocols
- intrusion detection
- real time
- secret key
- remote user authentication scheme
- public key
- rfid tags
- computer systems
- similarity measure