Two robust remote user authentication protocols using smart cards.
Kuo-Hui YehChunhua SuNai-Wei LoYingjiu LiYi-Xiang HungPublished in: J. Syst. Softw. (2010)
Keyphrases
- smart card
- authentication protocol
- user authentication
- remote user authentication scheme
- authentication scheme
- security analysis
- information security
- digital signature
- remote access
- secret key
- security requirements
- password guessing
- java card
- authentication systems
- security mechanisms
- countermeasures
- keystroke dynamics
- security protocols
- lightweight
- biometric authentication
- power analysis
- real time
- public key
- cost effective
- software architecture
- sensitive data
- rfid tags